{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:53:09Z","timestamp":1772041989434,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030125","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"308-317","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":96,"title":["Attestation-based policy enforcement for remote access"],"prefix":"10.1145","author":[{"given":"Reiner","family":"Sailer","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]},{"given":"Trent","family":"Jaeger","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]},{"given":"Xiaolan","family":"Zhang","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]},{"given":"Leendert","family":"van Doorn","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Trusted Platform Module Ma","author":"Trusted Computing Group","year":"2003","unstructured":"Trusted Computing Group . Trusted Platform Module Ma in Specification , October 2003 . Version 1 .2, Revision 62, http:\/\/www.trustedcomputinggroup.org.]] Trusted Computing Group. Trusted Platform Module Main Specification, October 2003. Version 1.2, Revision 62, http:\/\/www.trustedcomputinggroup.org.]]","journal-title":"Specification"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884406"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","DOI":"10.21236\/AD0772806","volume-title":"Computer Security Technology Planning Study","author":"Anderson J. P.","year":"1972","unstructured":"J. P. Anderson . Computer Security Technology Planning Study , 1972 .]] J. P. Anderson. Computer Security Technology Planning Study, 1972.]]"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762479"},{"key":"e_1_3_2_1_5_1","first-page":"223","volume-title":"Thirteenth Usenix Security Symposium","author":"Sailer Reiner","year":"2004","unstructured":"Reiner Sailer , Xiaolan Zhang , Trent Jaeger , and Leendert van Doorn . Design and Implementation of a TCG-based Integrity Measurement Architecture . In Thirteenth Usenix Security Symposium , pages 223 -- 238 , August 2004 .]] Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. In Thirteenth Usenix Security Symposium, pages 223--238, August 2004.]]"},{"key":"e_1_3_2_1_6_1","unstructured":"IBM Tivoli. IBM Tivoli Access Manager for e-business. http:\/\/www-3.ibm.com\/software\/ tivoli\/products\/access-mgr-e-bus\/.]]  IBM Tivoli. IBM Tivoli Access Manager for e-business. http:\/\/www-3.ibm.com\/software\/ tivoli\/products\/access-mgr-e-bus\/.]]"},{"key":"e_1_3_2_1_7_1","volume-title":"September","author":"Eastlake D.","year":"2001","unstructured":"D. Eastlake and P. Jones . Secure Hash Algorithm 1 (SHA1) , September 2001 . Request for Comment 3174.]] D. Eastlake and P. Jones. Secure Hash Algorithm 1 (SHA1), September 2001. Request for Comment 3174.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884371"},{"key":"e_1_3_2_1_10_1","first-page":"72","volume-title":"ESORICS","author":"Smith S. W.","year":"2002","unstructured":"S. W. Smith . Outgoing authentication for programmable secure coprocessors . In ESORICS , pages 72 -- 89 , 2002 .]] S. W. Smith. Outgoing authentication for programmable secure coprocessors. In ESORICS, pages 72--89, 2002.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.955100"},{"key":"e_1_3_2_1_12_1","unstructured":"IBM PCI-X Cryptographic Coprocessor 2004. http:\/\/www-3.ibm.com\/security\/cryptocards\/html\/pcixcc.shtml.]]  IBM PCI-X Cryptographic Coprocessor 2004. http:\/\/www-3.ibm.com\/security\/cryptocards\/html\/pcixcc.shtml.]]"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2000.904088"},{"key":"e_1_3_2_1_14_1","volume-title":"Doorn. Personal Firewalls and Intrusion Detection Systems. In 2nd Australian Information Warfare & Security Conference (IWAR)","author":"Dyer J.","year":"2001","unstructured":"J. Dyer , R. Perez , R. Sailer , and L. van Doorn. Personal Firewalls and Intrusion Detection Systems. In 2nd Australian Information Warfare & Security Conference (IWAR) , November 2001 .]] J. Dyer, R. Perez, R. Sailer, and L. van Doorn. Personal Firewalls and Intrusion Detection Systems. In 2nd Australian Information Warfare & Security Conference (IWAR), November 2001.]]"},{"key":"e_1_3_2_1_15_1","unstructured":"J. Molina A. Mishra and W. Arbaugh. The co-processor as an independent auditor. http:\/\/www.missl.cs.umd.edu\/komoku\/documents\/coauditor.ps.]]  J. Molina A. Mishra and W. Arbaugh. The co-processor as an independent auditor. http:\/\/www.missl.cs.umd.edu\/komoku\/documents\/coauditor.ps.]]"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133373.1133423"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/646039.678336"},{"key":"e_1_3_2_1_18_1","volume-title":"RSA Conference","author":"LaMacchia B. A.","year":"2003","unstructured":"B. A. LaMacchia . Next-generation secure computing base (NGSCB), April 2003 . RSA Conference 2003 , San Francisco.]] B. A. LaMacchia. Next-generation secure computing base (NGSCB), April 2003. RSA Conference 2003, San Francisco.]]"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_20_1","volume-title":"15th National Computer Security Conference","author":"Ferraiolo D.F.","year":"1992","unstructured":"D.F. Ferraiolo and D.R. Kuhn . Role based access control . In 15th National Computer Security Conference , 1992 .]] D.F. Ferraiolo and D.R. Kuhn. Role based access control. In 15th National Computer Security Conference, 1992.]]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1987.10001"},{"key":"e_1_3_2_1_24_1","volume-title":"November","author":"Bellovin S. M.","year":"1999","unstructured":"S. M. Bellovin . Distributed Firewalls . login , November 1999 .]] S. M. Bellovin. Distributed Firewalls. login, November 1999.]]"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.353052"},{"key":"e_1_3_2_1_26_1","unstructured":"The netfilter\/iptables project 2004. http:\/\/www.netfilter.org.]]  The netfilter\/iptables project 2004. http:\/\/www.netfilter.org.]]"},{"key":"e_1_3_2_1_27_1","unstructured":"The Open Group. Authorization (AZN) API -- Technical Standard. http:\/\/www.opengroup.org\/products\/publications\/catalog\/c908.htm.]]  The Open Group. Authorization (AZN) API -- Technical Standard. http:\/\/www.opengroup.org\/products\/publications\/catalog\/c908.htm.]]"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","location":"Washington DC USA","acronym":"CCS04","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030125","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":25,"alternative-id":["10.1145\/1030083.1030125","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030125","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}