{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:41Z","timestamp":1750307921350,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,20]],"date-time":"2007-03-20T00:00:00Z","timestamp":1174348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,20]]},"DOI":"10.1145\/1229285.1229304","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"117-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["SecureBus"],"prefix":"10.1145","author":[{"given":"Xinwen","family":"Zhang","sequence":"first","affiliation":[{"name":"George Mason University, Fairfax, Virginia"}]},{"given":"Michael J.","family":"Covington","sequence":"additional","affiliation":[{"name":"Intel Corporation, Hillsboro, Oregon"}]},{"given":"Songqing","family":"Chen","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, Virginia"}]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[{"name":"George Mason University and TriCipher Inc."}]}],"member":"320","published-online":{"date-parts":[[2007,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"LaGrande Technology Preliminary Architecture Specification http:\/\/www.intel.com\/technology\/security\/downloads\/PRELIMLT-SPEC_D52212.htm.]] LaGrande Technology Preliminary Architecture Specification http:\/\/www.intel.com\/technology\/security\/downloads\/PRELIMLT-SPEC_D52212.htm .]]"},{"key":"e_1_3_2_1_2_1","unstructured":"SETI@Home http:\/\/setiathome.ssl.berkeley.edu\/.]]  SETI@Home http:\/\/setiathome.ssl.berkeley.edu\/.]]"},{"key":"e_1_3_2_1_3_1","unstructured":"TCG Specification Architecture Overview. https:\/\/www.trustedcomputinggroup.org.]] TCG Specification Architecture Overview . https:\/\/www.trustedcomputinggroup.org.]]"},{"key":"e_1_3_2_1_4_1","unstructured":"Universial TUN\/TAP driver. http:\/\/vtun.sourceforge.net\/tun\/.]]  Universial TUN\/TAP driver. http:\/\/vtun.sourceforge.net\/tun\/.]]"},{"key":"e_1_3_2_1_5_1","first-page":"15","volume-title":"Proceedings of the FREENIX Track: USENIX Annual Technical Conference","year":"2001","unstructured":"TrustedBSD : Adding trusted operating system features to FreeBSD . In Proceedings of the FREENIX Track: USENIX Annual Technical Conference , pages 15 -- 28 , Boston, MA, USA , June 28 2001 .]] TrustedBSD: Adding trusted operating system features to FreeBSD. In Proceedings of the FREENIX Track: USENIX Annual Technical Conference, pages 15--28, Boston, MA, USA, June 28 2001.]]"},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/www.microsoft.com\/whdc\/winhec\/pres03.mspx","author":"Microsoft AMD","year":"2003","unstructured":"AMD platform for trustworthy computing. Microsoft WinHEC , http:\/\/www.microsoft.com\/whdc\/winhec\/pres03.mspx , 2003 .]] AMD platform for trustworthy computing. Microsoft WinHEC, http:\/\/www.microsoft.com\/whdc\/winhec\/pres03.mspx, 2003.]]"},{"key":"e_1_3_2_1_7_1","volume-title":"Microsoft WinHEC","author":"Technical","year":"2003","unstructured":"Technical introduction to next-generation secure computing base (NGSCB) . Microsoft WinHEC , 2003 .]] Technical introduction to next-generation secure computing base (NGSCB). Microsoft WinHEC, 2003.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605437"},{"key":"e_1_3_2_1_10_1","first-page":"206","volume-title":"Proceedings of the IEEE Symposium On Research in Security and Privacy","author":"Brewer D.","year":"1988","unstructured":"D. Brewer and M. Nash . The chinese wall security policy . In Proceedings of the IEEE Symposium On Research in Security and Privacy , pages 206 -- 214 , Oakland, California , 1988 .]] D. Brewer and M. Nash. The chinese wall security policy. In Proceedings of the IEEE Symposium On Research in Security and Privacy, pages 206--214, Oakland, California, 1988.]]"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/646962.712108"},{"key":"e_1_3_2_1_12_1","volume-title":"April","author":"Department of Defense National Computer Security Center.","year":"1991","unstructured":"Department of Defense National Computer Security Center. Trusted Database Interpretation of the Trusted Computer Systems Evaluation Criteria , April 1991 . NCSC-TG- 021.]] Department of Defense National Computer Security Center. Trusted Database Interpretation of the Trusted Computer Systems Evaluation Criteria, April 1991. NCSC-TG-021.]]"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 2000 Linux Showcase and Conference","author":"Dike Jeff","year":"2000","unstructured":"Jeff Dike . A user-mode port of the linux kernel . In Proceedings of the 2000 Linux Showcase and Conference , October 2000 .]] Jeff Dike. A user-mode port of the linux kernel. In Proceedings of the 2000 Linux Showcase and Conference, October 2000.]]"},{"issue":"2","key":"e_1_3_2_1_14_1","article-title":"Globus: A metacomputing infrastructure toolkit","volume":"11","author":"Foster I.","year":"1997","unstructured":"I. Foster and C. Kesselman . Globus: A metacomputing infrastructure toolkit . International Journal of Supercmputer Applications , 11 ( 2 ), 1997 .]] I. Foster and C. Kesselman. Globus: A metacomputing infrastructure toolkit. International Journal of Supercmputer Applications, 11(2), 1997.]]","journal-title":"International Journal of Supercmputer Applications"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"key":"e_1_3_2_1_16_1","first-page":"29","volume-title":"Proceedings of the Third virtual Machine Research and Technology Symposium","author":"Haldar V.","year":"2004","unstructured":"V. Haldar , D. Chandra , and M. Franz . Semantic remote attestation - a virtual machine directed approach to trusted computing . In Proceedings of the Third virtual Machine Research and Technology Symposium , pages 29 -- 41 , San Jose, CA, USA, May 6--7 2004 . USENIX.]] V. Haldar, D. Chandra, and M. Franz. Semantic remote attestation - a virtual machine directed approach to trusted computing. In Proceedings of the Third virtual Machine Research and Technology Symposium, pages 29--41, San Jose, CA, USA, May 6--7 2004. USENIX.]]"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/882493.884380"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.11"},{"key":"e_1_3_2_1_19_1","first-page":"29","volume-title":"Proceedings of USENIX Annual Technical Conference","author":"Loscocco P.","year":"2001","unstructured":"P. Loscocco and S. Smalley . Integrating flexible support for security policies into the linux operating system . In Proceedings of USENIX Annual Technical Conference , pages 29 -- 42 , June 25 --30 2001 .]] P. Loscocco and S. Smalley. Integrating flexible support for security policies into the linux operating system. In Proceedings of USENIX Annual Technical Conference, pages 29--42, June 25--30 2001.]]"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of Usenix Annual Technical Conference","author":"Muir S.","year":"2005","unstructured":"S. Muir , L. Peterson , M. Fiuczynski , J. Cappos , and J. Hartman . Proper: Privileged operations in a virtualised system environment . In Proceedings of Usenix Annual Technical Conference , 2005 .]] S. Muir, L. Peterson, M. Fiuczynski, J. Cappos, and J. Hartman. Proper: Privileged operations in a virtualised system environment. In Proceedings of Usenix Annual Technical Conference, 2005.]]"},{"key":"e_1_3_2_1_21_1","volume-title":"Core Specification: eXtensible Access Control Markup Language (XACML)","author":"OASIS XACML","year":"2005","unstructured":"OASIS XACML TC. Core Specification: eXtensible Access Control Markup Language (XACML) , 2005 .]] OASIS XACML TC. Core Specification: eXtensible Access Control Markup Language (XACML), 2005.]]"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.40"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128848"},{"key":"e_1_3_2_1_25_1","first-page":"286","volume-title":"Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908","author":"Sadeghi A.","year":"2003","unstructured":"A. Sadeghi and C. Stuble . Taming trusted platforms by operating system design . In Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908 , pages 286 -- 302 , Berlin, Germany , August 2003 .]] A. Sadeghi and C. Stuble. Taming trusted platforms by operating system design. In Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908, pages 286--302, Berlin, Germany, August 2003.]]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241422"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1044872"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 11th USENIX Security Symposium","author":"Wright C.","year":"2002","unstructured":"C. Wright , C. Cowan , S. Smalley , J. Morris , and G. Kroah-Hartman . Linux security modules: General security support for the linux kernel . In Proceedings of the 11th USENIX Security Symposium , 2002 .]] C. Wright, C. Cowan, S. Smalley, J. Morris, and G. Kroah-Hartman. Linux security modules: General security support for the linux kernel. In Proceedings of the 11th USENIX Security Symposium, 2002.]]"}],"event":{"name":"Asia CCS07: Asia CCS'07 ACM Symposium on Information, Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore","acronym":"Asia CCS07"},"container-title":["Proceedings of the 2nd ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1229285.1229304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:36Z","timestamp":1750258296000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229304"}},"subtitle":["towards application-transparent trusted computing with mandatory access control"],"short-title":[],"issued":{"date-parts":[[2007,3,20]]},"references-count":27,"alternative-id":["10.1145\/1229285.1229304","10.1145\/1229285"],"URL":"https:\/\/doi.org\/10.1145\/1229285.1229304","relation":{},"subject":[],"published":{"date-parts":[[2007,3,20]]},"assertion":[{"value":"2007-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}