{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:51Z","timestamp":1750307691979,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456455.1456465","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"61-70","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Scheduling execution of credentials in constrained secure environments"],"prefix":"10.1145","author":[{"given":"Jan-Erik","family":"Ekberg","sequence":"first","affiliation":[{"name":"Nokia Research Center, Helsinki, Finland"}]},{"given":"N.","family":"Asokan","sequence":"additional","affiliation":[{"name":"Nokia Research Center, Helsinki, Finland"}]},{"given":"Kari","family":"Kostiainen","sequence":"additional","affiliation":[{"name":"Nokia Research Center, Helsinki, Finland"}]},{"given":"Aarne","family":"Rantala","sequence":"additional","affiliation":[{"name":"Technical Research Center, Finland, Helsinki, Finland"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ARM. TrustZone-enabled processor. http:\/\/www.arm.com\/pdfs\/DDI0301D_arm1176jzfs_r0p2_trm.pdf.  ARM. TrustZone-enabled processor. http:\/\/www.arm.com\/pdfs\/DDI0301D_arm1176jzfs_r0p2_trm.pdf."},{"key":"e_1_3_2_1_6_1","unstructured":"The Programming Language Lua. http:\/\/www.lua.org\/.  The Programming Language Lua. http:\/\/www.lua.org\/."},{"key":"e_1_3_2_1_7_1","volume-title":"M-Shield mobile security technology","author":"Srage Jay","year":"2005","unstructured":"Jay Srage and Jerome Azema . M-Shield mobile security technology , 2005 . TI White paper. http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf. Jay Srage and Jerome Azema. M-Shield mobile security technology, 2005. TI White paper. http:\/\/focus.ti.com\/pdfs\/wtbu\/ti_mshield_whitepaper.pdf."},{"key":"e_1_3_2_1_8_1","volume-title":"July","author":"Sundaresan Harini","year":"2003","unstructured":"Harini Sundaresan . OMAP platform security features , July 2003 . TI White paper. http:\/\/focus.ti.com\/pdfs\/vf\/wireless\/platformsecuritywp.pdf. Harini Sundaresan. OMAP platform security features, July 2003. TI White paper. http:\/\/focus.ti.com\/pdfs\/vf\/wireless\/platformsecuritywp.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"Trusted Computing Group. https:\/\/www.trustedcomputinggroup.org\/home.  Trusted Computing Group. https:\/\/www.trustedcomputinggroup.org\/home."},{"key":"e_1_3_2_1_10_1","unstructured":"Trusted Platform Module (TPM) Specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/.  Trusted Platform Module (TPM) Specifications. https:\/\/www.trustedcomputinggroup.org\/specs\/TPM\/."}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 3rd ACM workshop on Scalable trusted computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456465","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456455.1456465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456455.1456465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":6,"alternative-id":["10.1145\/1456455.1456465","10.1145\/1456455"],"URL":"https:\/\/doi.org\/10.1145\/1456455.1456465","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}