{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:09:10Z","timestamp":1763467750934,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128820","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"2-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":44,"title":["Secure information sharing enabled by Trusted Computing and PEI models"],"prefix":"10.1145","author":[{"given":"Ravi","family":"Sandhu","sequence":"first","affiliation":[{"name":"George Mason University and TriCipher Inc."}]},{"given":"Kumar","family":"Ranganathan","sequence":"additional","affiliation":[{"name":"Intel System Research Center Bangalore, India"}]},{"given":"Xinwen","family":"Zhang","sequence":"additional","affiliation":[{"name":"George Mason University"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Intel Developer Forum","author":"LaGrande","year":"2003","unstructured":"LaGrande technology architecture. Intel Developer Forum , 2003 . LaGrande technology architecture. Intel Developer Forum, 2003."},{"key":"e_1_3_2_1_2_1","first-page":"257","volume-title":"Proceedings of 14th NIST-NCSC National Computer Security Conference","author":"Abrams M.","year":"1991","unstructured":"M. Abrams , J. Heaney , O. King , L. LaPadula , M. Lazear , and Ingrid. Olson. Generalized framework for access control: Toward prototyping the Orgcon policy . In Proceedings of 14th NIST-NCSC National Computer Security Conference , pages 257 -- 266 , 1991 . M. Abrams, J. Heaney, O. King, L. LaPadula, M. Lazear, and Ingrid. Olson. Generalized framework for access control: Toward prototyping the Orgcon policy. In Proceedings of 14th NIST-NCSC National Computer Security Conference, pages 257--266, 1991."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382913"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2005.40"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/360051.360056"},{"key":"e_1_3_2_1_8_1","volume-title":"December","author":"Department of Defense National Computer Security Center.","year":"1985","unstructured":"Department of Defense National Computer Security Center. Department of Defense Trusted Computer Systems Evaluation Criteria , December 1985 . DoD 5200.28-STD. Department of Defense National Computer Security Center. Department of Defense Trusted Computer Systems Evaluation Criteria, December 1985. DoD 5200.28-STD."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1212691"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/501978.501980"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_3_2_1_12_1","first-page":"417","volume-title":"AFIPS Spring Joint Computer Conference","author":"Graham G.S.","year":"1972","unstructured":"G.S. Graham and P.J. Denning . Protection -- principles and practice . In AFIPS Spring Joint Computer Conference , pages 40: 417 -- 429 , 1972 . G.S. Graham and P.J. Denning. Protection -- principles and practice. In AFIPS Spring Joint Computer Conference, pages 40:417--429, 1972."},{"key":"e_1_3_2_1_13_1","first-page":"296","volume-title":"Proceedings of NIST-NCSC National Computer Security Conference","author":"Graubart R.","year":"1989","unstructured":"R. Graubart . On the need for a third form of access control . In Proceedings of NIST-NCSC National Computer Security Conference , pages 296 -- 303 , 1989 . R. Graubart. On the need for a third form of access control. In Proceedings of NIST-NCSC National Computer Security Conference, pages 296--303, 1989."},{"key":"e_1_3_2_1_14_1","first-page":"29","volume-title":"Proceedings of the Third virtual Machine Research and Technology Symposium","author":"Haldar V.","year":"2004","unstructured":"V. Haldar , D. Chandra , and M. Franz . Semantic remote attestation - a virtual machine directed approach to trusted computing . In Proceedings of the Third virtual Machine Research and Technology Symposium , pages 29 -- 41 , San Jose, CA, USA , May 6-7 2004 . USENIX. V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation - a virtual machine directed approach to trusted computing. In Proceedings of the Third virtual Machine Research and Technology Symposium, pages 29--41, San Jose, CA, USA, May 6-7 2004. USENIX."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/360303.360333"},{"key":"e_1_3_2_1_16_1","first-page":"2898","volume":"0","author":"Kaliski B.","year":"2000","unstructured":"B. Kaliski . PKCS #5 : Password-Based Cryptography Specification Version 2 . 0 , September 2000 . RFC 2898 . B. Kaliski. PKCS #5: Password-Based Cryptography Specification Version 2.0, September 2000. RFC 2898.","journal-title":"Password-Based Cryptography Specification Version 2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/775265.775268"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/800213.806531"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63850"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/354876.354878"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/863632.883494"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_24_1","first-page":"224","volume-title":"Proceedings of 6th Annual Computer Security Application Conference","author":"Park Jaehong","year":"2000","unstructured":"Jaehong Park , Ravi Sandhu , and James Schifalacqua . Security architectures for controlled digital information dissemination . In Proceedings of 6th Annual Computer Security Application Conference , pages 224 -- 233 , New Orleans, LA, December 11--15 2000 . Jaehong Park, Ravi Sandhu, and James Schifalacqua. Security architectures for controlled digital information dissemination. In Proceedings of 6th Annual Computer Security Application Conference, pages 224--233, New Orleans, LA, December 11--15 2000."},{"key":"e_1_3_2_1_25_1","volume-title":"Trusted Computing Platforms: TCPA Technology in Context","author":"Pearson Siani","year":"2003","unstructured":"Siani Pearson , Boris Balacheff , Liqun Chen , David Plaquin , and Graeme Proudler . Trusted Computing Platforms: TCPA Technology in Context . Prentice-Hall , 2003 . Siani Pearson, Boris Balacheff, Liqun Chen, David Plaquin, and Graeme Proudler. Trusted Computing Platforms: TCPA Technology in Context. Prentice-Hall, 2003."},{"key":"e_1_3_2_1_26_1","first-page":"286","volume-title":"Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908","author":"Sadeghi A.","year":"2003","unstructured":"A. Sadeghi and C. Stuble . Taming trusted platforms by operating system design . In Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908 , pages 286 -- 302 , Berlin, Germany , August 2003 . A. Sadeghi and C. Stuble. Taming trusted platforms by operating system design. In Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908, pages 286--302, Berlin, Germany, August 2003."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030125"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/882488.884182"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344309"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/300830.300839"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/286884.286893"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064005"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of Wireless Personal Multimedia Communications","author":"Manoj","year":"2005","unstructured":"Manoj R. Sastry and Michael J. Covington. Attribute-based authentication using trusted platforms . In Proceedings of Wireless Personal Multimedia Communications , Aalborg, Denmark, September 18--22 2005 . Manoj R. Sastry and Michael J. Covington. Attribute-based authentication using trusted platforms. In Proceedings of Wireless Personal Multimedia Communications, Aalborg, Denmark, September 18--22 2005."},{"key":"e_1_3_2_1_36_1","volume-title":"the Second International Workshop on Economics and Information Security","author":"Schechter S.","year":"2003","unstructured":"S. Schechter , R. Greenstadt , and M. Smith . Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment . In the Second International Workshop on Economics and Information Security , College Park, MD, USA , May 29-30 2003 . S. Schechter, R. Greenstadt, and M. Smith. Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment. In the Second International Workshop on Economics and Information Security, College Park, MD, USA, May 29-30 2003."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/1044872"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/998684.1006928"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.124"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108906.1108908"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128820","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:16Z","timestamp":1750259176000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":39,"alternative-id":["10.1145\/1128817.1128820","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128820","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}