{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:32:46Z","timestamp":1729647166933,"version":"3.28.0"},"reference-count":45,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1109\/hpcsim.2011.5999856","type":"proceedings-article","created":{"date-parts":[[2011,8,31]],"date-time":"2011-08-31T15:18:55Z","timestamp":1314803935000},"page":"427-434","source":"Crossref","is-referenced-by-count":15,"title":["Enhancing data privacy and integrity in the cloud"],"prefix":"10.1109","author":[{"given":"Jeffrey","family":"Naruchitparames","sequence":"first","affiliation":[]},{"given":"Mehmet Hadi","family":"Gunes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Key challenges in DRM: An industry perspective","author":"lamacchia","year":"2002","journal-title":"ACM Workshop on Digital Rights Management"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848460"},{"key":"17","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/978-3-540-73275-4_16","article-title":"Direct anonymous attestation (DAA): Ensuring privacy with corrupt administrators","author":"smyth","year":"2007","journal-title":"4th European Workshop on Security and Privacy in Ad Hoc and Sensor Networks"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/HotMobile.2007.14"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-8348-9324-6_18"},{"journal-title":"An Open Trusted Computing Architecture Secure Virtual Machines Enabling User-defined Policy Enforcement","year":"2006","author":"kuhlmann","key":"15"},{"key":"34","article-title":"Integrity considerations for secure computer systems","author":"biba","year":"1977","journal-title":"MITRE Corp Tech Rep"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2007.179"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179479"},{"journal-title":"Trusted Execution Technology Architectural Overview","year":"0","key":"13"},{"journal-title":"IBM Cryptographic Coprocessors","year":"0","key":"14"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"journal-title":"Trusted Computing Group","year":"0","key":"11"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1377836.1377864"},{"key":"12","first-page":"86","article-title":"NGSCB: A trusted open system","author":"peinado","year":"2004","journal-title":"9th Australasian Conference on Information Security and Privacy Springer"},{"key":"21","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1007\/978-3-540-31979-5_5","article-title":"Short linkable ring signatures for e-voting, e-cash and attestation","author":"tsang","year":"2005","journal-title":"Information Security Practice and Experience"},{"key":"20","article-title":"Shame on trust in distributed systems","author":"jaeger","year":"2006","journal-title":"1st Workshop on Hot Topics in Security"},{"key":"43","first-page":"1","article-title":"Turtles all the way down: Research challenges in user-based attestation","author":"mccune","year":"2007","journal-title":"HOTSEC'07 Proceedings of the 2nd USENIX Workshop on Hot Topics in Security"},{"key":"42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1095809.1095812","article-title":"Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms","author":"seshadri","year":"2005","journal-title":"ACM Symposium on Operating systems Principles"},{"key":"41","article-title":"Prima: Policy-reduced integrity measurement architecture","author":"shankar","year":"2006","journal-title":"11th Symposium on Access Control Models and Technologies"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179481"},{"journal-title":"Guide to Elliptic Curve Cryptography","year":"2003","author":"hankerson","key":"45"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/1456455.1456457"},{"key":"22","first-page":"372","article-title":"Enhancing grid security using trusted virtualization","author":"lhr","year":"2006","journal-title":"2nd Workshop on Advances in Trusted Computing"},{"key":"23","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1007\/978-0-387-72367-9_5","article-title":"Trusted ticket systems and applications","volume":"232","author":"kuntze","year":"2007","journal-title":"New Approaches for Security Privacy and Trust in Complex Systems"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1138063.1138076"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1314354.1314364"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2005.40"},{"key":"27","first-page":"308","article-title":"Attestation-based policy enforcement for remote access","author":"sailer","year":"2004","journal-title":"11th ACM Conference on computer and communications security"},{"key":"28","first-page":"305","article-title":"VTPM virtualizing the trusted platform module","author":"berger","year":"2006","journal-title":"15th USENIX Security Symposium"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945464"},{"journal-title":"More Security Loopholes Found in Google Docs","year":"0","author":"wauters","key":"3"},{"key":"2","first-page":"1","article-title":"Privacy in the clouds: Risks to privacy and confidentiality from cloud computing","author":"gellmax","year":"2009","journal-title":"World Privacy Forum"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0033-0"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653688"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1435458.1435465"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.862423"},{"journal-title":"TCG Architecture Overview","year":"2007","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1355284.1355290"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1080\/01611190802231140"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1278901.1278904"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/2.955100"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601317"}],"event":{"name":"Simulation (HPCS)","start":{"date-parts":[[2011,7,4]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2011,7,8]]}},"container-title":["2011 International Conference on High Performance Computing &amp; Simulation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5979720\/5999789\/05999856.pdf?arnumber=5999856","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T01:27:37Z","timestamp":1497922057000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5999856\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/hpcsim.2011.5999856","relation":{},"subject":[],"published":{"date-parts":[[2011,7]]}}}