{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:55:52Z","timestamp":1754488552414,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1145\/1063979.1064005","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"147-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["Peer-to-peer access control architecture using trusted computing technology"],"prefix":"10.1145","author":[{"given":"Ravi","family":"Sandhu","sequence":"first","affiliation":[{"name":"George Mason University"}]},{"given":"Xinwen","family":"Zhang","sequence":"additional","affiliation":[{"name":"George Mason University"}]}],"member":"320","published-online":{"date-parts":[[2005,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Next-generation secure computing base. http:\/\/www.microsoft.com\/resources\/ngscb.  Next-generation secure computing base. http:\/\/www.microsoft.com\/resources\/ngscb."},{"key":"e_1_3_2_1_2_1","unstructured":"TCG Specification Architecture Overview. https:\/\/www.trustedcomputinggroup.org.  TCG Specification Architecture Overview. https:\/\/www.trustedcomputinggroup.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Trusted platform module (TPM) security policy. http:\/\/www.trustedcomputinggroup.org.  Trusted platform module (TPM) security policy. http:\/\/www.trustedcomputinggroup.org."},{"key":"e_1_3_2_1_4_1","volume-title":"Intel Developer Forum","author":"LaGrande","year":"2003","unstructured":"LaGrande technology architecture. Intel Developer Forum , 2003 . LaGrande technology architecture. Intel Developer Forum, 2003."},{"key":"e_1_3_2_1_5_1","first-page":"31","author":"Symantec","year":"2003","unstructured":"Symantec internet security threat report , Trends for July 1, 2003 -December 31 , 2003. Symantec internet security threat report, Trends for July 1, 2003-December 31, 2003.","journal-title":"Trends for"},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/www.trustedcomputinggroup.org","author":"Software TCG","year":"2003","unstructured":"TCG Software Stack (TSS) Specification Version 1.10. https:\/\/www.trustedcomputinggroup.org , 2003 . TCG Software Stack (TSS) Specification Version 1.10. https:\/\/www.trustedcomputinggroup.org, 2003."},{"key":"e_1_3_2_1_7_1","unstructured":"TCPA resources IBM Watson Research. http:\/\/www.research.ibm.com\/gsal\/tcpa 2003.  TCPA resources IBM Watson Research. http:\/\/www.research.ibm.com\/gsal\/tcpa 2003."},{"key":"e_1_3_2_1_8_1","volume-title":"https:\/\/www.trustedcomputinggroup.org","author":"Main TPM","year":"2003","unstructured":"TPM Main Part 1 Design Principles Specification Version 1.2. https:\/\/www.trustedcomputinggroup.org , 2003 . TPM Main Part 1 Design Principles Specification Version 1.2. https:\/\/www.trustedcomputinggroup.org, 2003."},{"key":"e_1_3_2_1_9_1","unstructured":"Trusted Mobile Platform Software Architecture Description. http:\/\/www.trusted-mobile.org\/ 2004.  Trusted Mobile Platform Software Architecture Description. http:\/\/www.trusted-mobile.org\/ 2004."},{"key":"e_1_3_2_1_10_1","unstructured":"TrustZone: Integrated hardware and software security: Enabling trusted computing in embedded systesm. http:\/\/www.arm.com\/products\/CPUs\/arch-trustzone.html 2004.  TrustZone: Integrated hardware and software security: Enabling trusted computing in embedded systesm. http:\/\/www.arm.com\/products\/CPUs\/arch-trustzone.html 2004."},{"key":"e_1_3_2_1_11_1","volume-title":"Trusted Computing Platforms: TCPA Technology in Context","author":"Balacheff B.","year":"2003","unstructured":"B. Balacheff , L. Chen , S. Pearson , D. Plaquin , and G. Proudler . Trusted Computing Platforms: TCPA Technology in Context . Prentice Hall PTR , 2003 . B. Balacheff, L. Chen, S. Pearson, D. Plaquin, and G. Proudler. Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"Microprocessor Report","author":"Baron M.","year":"2004","unstructured":"M. Baron . Bulverde and Marathon turn cellphones into PCs . Microprocessor Report , July 2004 . M. Baron. Bulverde and Marathon turn cellphones into PCs. Microprocessor Report, July 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030103"},{"key":"e_1_3_2_1_14_1","volume-title":"December","author":"Department of Defense National Computer Security Center.","year":"1985","unstructured":"Department of Defense National Computer Security Center. Department of Defense Trusted Computer Systems Evaluation Criteria , December 1985 . DoD 5200.28-STD. Department of Defense National Computer Security Center. Department of Defense Trusted Computer Systems Evaluation Criteria, December 1985. DoD 5200.28-STD."},{"key":"e_1_3_2_1_15_1","volume-title":"April","author":"Department of Defense National Computer Security Center.","year":"1991","unstructured":"Department of Defense National Computer Security Center. Trusted Database Interpretation of the Trusted Computer Systems Evaluation Criteria , April 1991 . NCSC-TG- 021. Department of Defense National Computer Security Center. Trusted Database Interpretation of the Trusted Computer Systems Evaluation Criteria, April 1991. NCSC-TG-021."},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. of the Third virtual Machine Research and Technology Symposium. USENIX","author":"Haldar V.","year":"2004","unstructured":"V. Haldar , D. Chandra , and M. Franz . Semantic remote attestation - a virtual machine directed approach to trusted computing . In Proc. of the Third virtual Machine Research and Technology Symposium. USENIX , 2004 . V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation - a virtual machine directed approach to trusted computing. In Proc. of the Third virtual Machine Research and Technology Symposium. USENIX, 2004."},{"key":"e_1_3_2_1_17_1","volume-title":"Capability-based computer systems","author":"Levy Henry","year":"1984","unstructured":"Henry Levy . Capability-based computer systems . Digital Press , 1984 . Available at http:\/\/www.cs.washington.edu\/homes\/levy\/capabook\/index.html. Henry Levy. Capability-based computer systems. Digital Press, 1984. Available at http:\/\/www.cs.washington.edu\/homes\/levy\/capabook\/index.html."},{"volume-title":"Proc. of USENIX Annual Technical Conference, June 25-30","author":"Loscocco P.","key":"e_1_3_2_1_18_1","unstructured":"P. Loscocco and S. Smalley . Integrating flexible support for security policies into the linux operating system . In Proc. of USENIX Annual Technical Conference, June 25-30 . P. Loscocco and S. Smalley. Integrating flexible support for security policies into the linux operating system. In Proc. of USENIX Annual Technical Conference, June 25-30."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/784591.784718"},{"key":"e_1_3_2_1_20_1","volume-title":"4th International Workshop, LNCS 2908","author":"Sadeghi A.","year":"2003","unstructured":"A. Sadeghi and C. Stuble . Taming trusted platforms by operating system design. In Information Security Applications , 4th International Workshop, LNCS 2908 , 2003 . A. Sadeghi and C. Stuble. Taming trusted platforms by operating system design. In Information Security Applications, 4th International Workshop, LNCS 2908, 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065907.1066038"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030125"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/361011.361067"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344309"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_26_1","volume-title":"the Second International Workshop on Economics and Information Security","author":"Schechter S.","year":"2003","unstructured":"S. Schechter , R. Greenstadt , and M. Smith . Trusted computing, peer-topeer distribution, and the economics of pirated entertainment . In the Second International Workshop on Economics and Information Security , 2003 . S. Schechter, R. Greenstadt, and M. Smith. Trusted computing, peer-topeer distribution, and the economics of pirated entertainment. In the Second International Workshop on Economics and Information Security, 2003."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990038"}],"event":{"name":"SACMAT05: 10th ACM Symposium on Access Control Models and Technologies 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Stockholm Sweden","acronym":"SACMAT05"},"container-title":["Proceedings of the tenth ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1064005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1063979.1064005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:19:12Z","timestamp":1750263552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1064005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":27,"alternative-id":["10.1145\/1063979.1064005","10.1145\/1063979"],"URL":"https:\/\/doi.org\/10.1145\/1063979.1064005","relation":{},"subject":[],"published":{"date-parts":[[2005,6]]},"assertion":[{"value":"2005-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}