{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:27:37Z","timestamp":1750307257474,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T00:00:00Z","timestamp":1297123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,2,8]]},"DOI":"10.1145\/1940761.1940796","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"252-259","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["iControl"],"prefix":"10.1145","author":[{"given":"Karen","family":"Pollock","sequence":"first","affiliation":[{"name":"University of Toronto, Toronto, Ontario"}]}],"member":"320","published-online":{"date-parts":[[2011,2,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Anderson Ross. (2003 August). Trusted Computing Frequently Asked Questions Version 1.1. GNU. Retrieved from http:\/\/www.cl.cam.ac.uk\/~rja14\/tcpa-faq.html  Anderson Ross. (2003 August). Trusted Computing Frequently Asked Questions Version 1.1. GNU. Retrieved from http:\/\/www.cl.cam.ac.uk\/~rja14\/tcpa-faq.html"},{"key":"e_1_3_2_1_2_1","unstructured":"Apple Inc. (2009 August 5). In the matter of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technology: Response of Apple Inc. to Questions Submitted by the Copyright Office Concerning Exemptions 5A and 11A (Class #1). Letter to the US Copyright Office Library of Congress.  Apple Inc. (2009 August 5). In the matter of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technology: Response of Apple Inc. to Questions Submitted by the Copyright Office Concerning Exemptions 5A and 11A (Class #1). Letter to the US Copyright Office Library of Congress ."},{"key":"e_1_3_2_1_3_1","volume-title":"Unauthorized modification of iOS has been a major source of instability, disruption of services, and other issues","author":"Apple Inc.","year":"2010","unstructured":"Apple Inc. ( 2010 ). Unauthorized modification of iOS has been a major source of instability, disruption of services, and other issues . Apple Inc. (2010). Unauthorized modification of iOS has been a major source of instability, disruption of services, and other issues."},{"key":"e_1_3_2_1_4_1","unstructured":"Apple Inc. (2010 Janurary). iPhone Developer Program License Agreement.  Apple Inc. (2010 Janurary). iPhone Developer Program License Agreement."},{"key":"e_1_3_2_1_5_1","unstructured":"Bangeman Eric. (2008 April 02). Apple passes Wal-Mart now #1 music retailer in US. Ars Technica. Retrieved from http:\/\/arstechnica.com\/apple\/news\/2008\/04\/apple-passes-wal-mart-now-1--music-retailer-in-us.ars  Bangeman Eric. (2008 April 02). Apple passes Wal-Mart now #1 music retailer in US. Ars Technica . Retrieved from http:\/\/arstechnica.com\/apple\/news\/2008\/04\/apple-passes-wal-mart-now-1--music-retailer-in-us.ars"},{"key":"e_1_3_2_1_6_1","unstructured":"Beaumont Claudine. (2008 August 11). Apple's Jobs confirms iPhone 'kill switch.' The Telegraph. Retrieved from http:\/\/www.telegraph.co.uk\/technology\/3358134\/Apples-Jobs-confirms-iPhone-kill-switch.html  Beaumont Claudine. (2008 August 11). Apple's Jobs confirms iPhone 'kill switch.' The Telegraph . Retrieved from http:\/\/www.telegraph.co.uk\/technology\/3358134\/Apples-Jobs-confirms-iPhone-kill-switch.html"},{"key":"e_1_3_2_1_7_1","volume-title":"The Control Revolution","author":"Beniger James","year":"1986","unstructured":"Beniger , James . ( 1986 ). The Control Revolution . Cambridge, Mass : Harvard University Press . Beniger, James. (1986). The Control Revolution. Cambridge, Mass: Harvard University Press."},{"key":"e_1_3_2_1_8_1","unstructured":"Carroll Amy Mario Juarez Julia Polk and Tony Leininger. (2002 June). Microsoft Palladium: A Business Overview. Microsoft Content Security Business Unit.  Carroll Amy Mario Juarez Julia Polk and Tony Leininger. (2002 June). Microsoft Palladium: A Business Overview. Microsoft Content Security Business Unit ."},{"key":"e_1_3_2_1_9_1","volume-title":"Letter to the Copyright Office","author":"Freeman Jay","year":"2010","unstructured":"Freeman , Jay . ( 2010 ). Letter to the Copyright Office . Freeman, Jay. (2010). Letter to the Copyright Office."},{"key":"e_1_3_2_1_10_1","unstructured":"Geist Michael. (2007 January 29). Vista's Fine Print Raises Red Flags. Toronto Star. Retrieved from http:\/\/www.thestar.com\/Business\/article\/175801  Geist Michael. (2007 January 29). Vista's Fine Print Raises Red Flags. Toronto Star . Retrieved from http:\/\/www.thestar.com\/Business\/article\/175801"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/1296085"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/10304310802710546"},{"volume-title":"Thoughts On Flash","author":"Jobs Steve","key":"e_1_3_2_1_13_1","unstructured":"Jobs , Steve . (2010 April). Thoughts On Flash . Apple Inc. Retrieved from http:\/\/www.apple.com\/hotnews\/thoughts-on-flash\/ Jobs, Steve. (2010 April). Thoughts On Flash. Apple Inc. Retrieved from http:\/\/www.apple.com\/hotnews\/thoughts-on-flash\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Kahney Leander. (2008 March 18). How Apple Got Everything Right By Doing Everything Wrong. Wired Magazine. 16(04).  Kahney Leander. (2008 March 18). How Apple Got Everything Right By Doing Everything Wrong. Wired Magazine . 16(04)."},{"key":"e_1_3_2_1_15_1","unstructured":"Kahney Leander. (2002 December 4). Apple: It's All About the Brand. Wired. Retrieved from http:\/\/www.wired.com\/gadgets\/mac\/commentary\/cultofmac\/2002\/12\/56677  Kahney Leander. (2002 December 4). Apple: It's All About the Brand. Wired . Retrieved from http:\/\/www.wired.com\/gadgets\/mac\/commentary\/cultofmac\/2002\/12\/56677"},{"key":"e_1_3_2_1_16_1","unstructured":"Kosman Josh. (2010 May 3). An Antitrust App: apple may be in the eye of a regulatory storm. New York Post. Retrieved from http:\/\/www.nypost.com\/p\/news\/business\/an_antitrust_app_buvCWcJdjFoLD5vBSkguGO  Kosman Josh. (2010 May 3). An Antitrust App: apple may be in the eye of a regulatory storm. New York Post . Retrieved from http:\/\/www.nypost.com\/p\/news\/business\/an_antitrust_app_buvCWcJdjFoLD5vBSkguGO"},{"key":"e_1_3_2_1_17_1","unstructured":"Krazit Tom. (2008 August 7). Much ado about the iPhone's 'Kill Switch'. CNET News. Retrieved from http:\/\/news.cnet.com\/8301-13579_3-10010070-37.html  Krazit Tom. (2008 August 7). Much ado about the iPhone's 'Kill Switch'. CNET News . Retrieved from http:\/\/news.cnet.com\/8301-13579_3-10010070-37.html"},{"key":"e_1_3_2_1_18_1","unstructured":"Lemos Richard. (2002 November 7). Trust or Treachery? Security Technologies Could Backfire Against Consumers. CNET News. Retrieved from http:\/\/news.cnet.com\/2009-1001-964628.html  Lemos Richard. (2002 November 7). Trust or Treachery? Security Technologies Could Backfire Against Consumers. CNET News . Retrieved from http:\/\/news.cnet.com\/2009-1001-964628.html"},{"key":"e_1_3_2_1_19_1","unstructured":"Lessig Lawrence. (2002 September 10). Anti-trusting Microsoft. Red Herring. Retrieved from http:\/\/www.lessig.org\/content\/columns\/red1.pdf  Lessig Lawrence. (2002 September 10). Anti-trusting Microsoft. Red Herring . Retrieved from http:\/\/www.lessig.org\/content\/columns\/red1.pdf"},{"key":"e_1_3_2_1_20_1","unstructured":"Markoff John. (2003 June 30). A Safer System for Home PC's Feels Like Jail to Some Critics. The New York Times. Retrieved from http:\/\/www.nytimes.com\/2003\/06\/30\/business\/technology-a-safer-system-for-home-pc-s-feels-like-jail-to-some-critics.html  Markoff John. (2003 June 30). A Safer System for Home PC's Feels Like Jail to Some Critics. The New York Times . Retrieved from http:\/\/www.nytimes.com\/2003\/06\/30\/business\/technology-a-safer-system-for-home-pc-s-feels-like-jail-to-some-critics.html"},{"key":"e_1_3_2_1_21_1","volume-title":"Microsoft Next-Generation Secure Computing Base -- Technical FAQ. Microsoft TechNet. Available: http:\/\/technet.microsoft.com\/en-us\/library\/cc723472.aspx","author":"Microsoft Corporation","year":"2003","unstructured":"Microsoft Corporation . ( 2003 ). Microsoft Next-Generation Secure Computing Base -- Technical FAQ. Microsoft TechNet. Available: http:\/\/technet.microsoft.com\/en-us\/library\/cc723472.aspx Microsoft Corporation. (2003). Microsoft Next-Generation Secure Computing Base -- Technical FAQ. Microsoft TechNet. Available: http:\/\/technet.microsoft.com\/en-us\/library\/cc723472.aspx"},{"key":"e_1_3_2_1_22_1","volume-title":"Hardware Platform for the Next-Generation Secure Computing Base. Windows Platform Design Notes","author":"Microsoft Corp.","year":"2003","unstructured":"Microsoft Corp. ( 2003 ). Hardware Platform for the Next-Generation Secure Computing Base. Windows Platform Design Notes . Microsoft Corp. (2003). Hardware Platform for the Next-Generation Secure Computing Base. Windows Platform Design Notes."},{"key":"e_1_3_2_1_23_1","unstructured":"Pilgrim Mark. (2010 January 29). Tinkerer's Sunset. Dive Into Mark. Retrieved from http:\/\/diveintomark.org\/archives\/2010\/01\/29\/tinkerers-sunset  Pilgrim Mark. (2010 January 29). Tinkerer's Sunset. Dive Into Mark . Retrieved from http:\/\/diveintomark.org\/archives\/2010\/01\/29\/tinkerers-sunset"},{"key":"e_1_3_2_1_24_1","unstructured":"Recording Industry Association of America. (1998 Dec 15). \"Worldwide Recording Industry Announces Precedent-Setting Initiative to Address New Digital Music Opportunities.\" New York NY. Retrieved from http:\/\/www.riaa.org\/newsitem.php?news_month_filter=&amp;news_year_filter=&amp;resultpage=142&amp;id=2F25E12D-6941-25B3-E47E-8B80246720EF  Recording Industry Association of America. (1998 Dec 15). \"Worldwide Recording Industry Announces Precedent-Setting Initiative to Address New Digital Music Opportunities.\" New York NY. Retrieved from http:\/\/www.riaa.org\/newsitem.php?news_month_filter=&amp;news_year_filter=&amp;resultpage=142&amp;id=2F25E12D-6941-25B3-E47E-8B80246720EF"},{"key":"e_1_3_2_1_25_1","volume-title":"Apple overtakes Microsoft as biggest tech company","author":"Rigby Billy","year":"2010","unstructured":"Rigby , Billy . (2010 May 26). Apple overtakes Microsoft as biggest tech company . Reuters . Retrieved from http:\/\/www.reuters.com\/article\/idUSTRE64P5PE 2010 0527 Rigby, Billy. (2010 May 26). Apple overtakes Microsoft as biggest tech company. Reuters. Retrieved from http:\/\/www.reuters.com\/article\/idUSTRE64P5PE20100527"},{"key":"e_1_3_2_1_26_1","unstructured":"Rubin Ross. (2005 March 2). Switched On; The \"i\" behind iPod: innovation integration or inertia? Engaget. Retrieved from http:\/\/www.engadget.com\/2005\/03\/02\/switched-on-the-i-behind-ipod-innovation-integration-or\/  Rubin Ross. (2005 March 2). Switched On; The \"i\" behind iPod: innovation integration or inertia? Engaget . Retrieved from http:\/\/www.engadget.com\/2005\/03\/02\/switched-on-the-i-behind-ipod-innovation-integration-or\/"},{"key":"e_1_3_2_1_27_1","volume-title":"Trusted Computing: Promise and Risk","author":"Schoen Seth","year":"2003","unstructured":"Schoen , Seth . ( 2003 ). Trusted Computing: Promise and Risk . Electronic Frontier Foundation. Retrieved from http:\/\/www.eff.org\/files\/20031001_tc.pdf. Schoen, Seth. (2003). Trusted Computing: Promise and Risk. Electronic Frontier Foundation. Retrieved from http:\/\/www.eff.org\/files\/20031001_tc.pdf."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2005.05.005"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.90.2.192"},{"key":"e_1_3_2_1_30_1","volume-title":"Free Software","author":"Stallman Richard","year":"2007","unstructured":"Stallman , Richard . ( 2007 ). Can You Trust Your Computer? In Joshua Grey (ed.) , Free Software , Free Society : Selected Essays of Richard M. Stallman. GNU Press . Stallman, Richard. (2007). Can You Trust Your Computer? In Joshua Grey (ed.), Free Software, Free Society: Selected Essays of Richard M. Stallman. GNU Press."},{"volume-title":"Design, Implementation and Usage Principles Version 2.0","author":"Trusted Computing Group Best Practices Committee. (2005 December).","key":"e_1_3_2_1_31_1","unstructured":"Trusted Computing Group Best Practices Committee. (2005 December). Design, Implementation and Usage Principles Version 2.0 . Trusted Computing Group . Retrieved from http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/59C26ECB-1D09-3519-AD469EA7AFBD2E91\/Best_Practices_Principles_Document_V2_0.pdf Trusted Computing Group Best Practices Committee. (2005 December). Design, Implementation and Usage Principles Version 2.0. Trusted Computing Group. Retrieved from http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/59C26ECB-1D09-3519-AD469EA7AFBD2E91\/Best_Practices_Principles_Document_V2_0.pdf"},{"key":"e_1_3_2_1_32_1","unstructured":"Trusted Computing Group. (2006 November). Backgrounder. Retrieved from http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/AB516914-1D09-3519-AD5263E3AE997912\/TCGBackgrounder_revised_amp_nov%2027%2006.pdf  Trusted Computing Group. (2006 November). Backgrounder. Retrieved from http:\/\/www.trustedcomputinggroup.org\/files\/resource_files\/AB516914-1D09-3519-AD5263E3AE997912\/TCGBackgrounder_revised_amp_nov%2027%2006.pdf"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/030631282012002001"},{"key":"e_1_3_2_1_34_1","unstructured":"Varian Hal R. (2002 July 4). New Chips Keep a Tight Rein on Consumers. New York Times. Retrieved from http:\/\/www.nytimes.com\/2002\/07\/04\/business\/04SCEN.html  Varian Hal R. (2002 July 4). New Chips Keep a Tight Rein on Consumers. New York Times . Retrieved from http:\/\/www.nytimes.com\/2002\/07\/04\/business\/04SCEN.html"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1185209"},{"key":"e_1_3_2_1_36_1","unstructured":"Wingfield Nick. (2008 August 11). iPhone Software Sales Takes Off. Wall Street Journal B1.  Wingfield Nick. (2008 August 11). iPhone Software Sales Takes Off. Wall Street Journal B1."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1370968"}],"event":{"name":"iConference '11: iConference 2011","acronym":"iConference '11","location":"Seattle Washington USA"},"container-title":["Proceedings of the 2011 iConference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940761.1940796","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940761.1940796","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:28Z","timestamp":1750243948000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940761.1940796"}},"subtitle":["comparing control architectures in computing technology"],"short-title":[],"issued":{"date-parts":[[2011,2,8]]},"references-count":37,"alternative-id":["10.1145\/1940761.1940796","10.1145\/1940761"],"URL":"https:\/\/doi.org\/10.1145\/1940761.1940796","relation":{},"subject":[],"published":{"date-parts":[[2011,2,8]]},"assertion":[{"value":"2011-02-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}