{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:09:01Z","timestamp":1761764941115,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":3,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,11]],"date-time":"2007-03-11T00:00:00Z","timestamp":1173571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,11]]},"DOI":"10.1145\/1244002.1244343","type":"proceedings-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:31Z","timestamp":1181140651000},"page":"1605-1606","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Designing a trust chain for a thin client on a live Linux cd"],"prefix":"10.1145","author":[{"given":"Megumi","family":"Nakamura","sequence":"first","affiliation":[{"name":"Tokyo Research Laboratory, IBM Japan"}]},{"given":"Seiji","family":"Munetoh","sequence":"additional","affiliation":[{"name":"Tokyo Research Laboratory, IBM Japan"}]}],"member":"320","published-online":{"date-parts":[[2007,3,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Trusted Computing Group (TCG) http:\/\/www.trustedcomputinggroup.org\/  Trusted Computing Group (TCG) http:\/\/www.trustedcomputinggroup.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Knoppix http:\/\/www.knopper.net\/knoppix\/index-en.html  Knoppix http:\/\/www.knopper.net\/knoppix\/index-en.html"},{"key":"e_1_3_2_1_3_1","first-page":"223","volume-title":"USENIX Security Symposium","author":"Sailer R.","year":"2004","unstructured":"R. Sailer , et. al. Design and Implementation of a TCG-based Integrity Measurement Architecture . USENIX Security Symposium 2004 , pp. 223 -- 238 . R. Sailer, et. al. Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium 2004, pp.223--238."}],"event":{"name":"SAC07: The 2007 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Seoul Korea","acronym":"SAC07"},"container-title":["Proceedings of the 2007 ACM symposium on Applied computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1244002.1244343","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1244002.1244343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:29Z","timestamp":1750258289000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1244002.1244343"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,11]]},"references-count":3,"alternative-id":["10.1145\/1244002.1244343","10.1145\/1244002"],"URL":"https:\/\/doi.org\/10.1145\/1244002.1244343","relation":{},"subject":[],"published":{"date-parts":[[2007,3,11]]},"assertion":[{"value":"2007-03-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}