{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:29:33Z","timestamp":1762522173009,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T00:00:00Z","timestamp":1528329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Federal Ministry of Education and Research (BMBF)","award":["16KIS0521"],"award-info":[{"award-number":["16KIS0521"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,7]]},"DOI":"10.1145\/3205977.3205990","type":"proceedings-article","created":{"date-parts":[[2018,6,7]],"date-time":"2018-06-07T19:49:37Z","timestamp":1528400977000},"page":"85-91","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves"],"prefix":"10.1145","author":[{"given":"Paul Georg","family":"Wagner","sequence":"first","affiliation":[{"name":"Karlsruhe Institute or Technology, Karlsruhe, Germany"}]},{"given":"Pascal","family":"Birnstill","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, Karlsruhe, Germany"}]},{"given":"J\u00fcrgen","family":"Beyerer","sequence":"additional","affiliation":[{"name":"Fraunhofer IOSB, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Ittai Anati Shay Gueron Simon Johnson and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy Vol. 13.  Ittai Anati Shay Gueron Simon Johnson and Vincent Scarlata. 2013. Innovative technology for CPU based attestation and sealing Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy Vol. 13."},{"key":"e_1_3_2_1_2_1","unstructured":"Anne Anderson Anthony Nadalin B Parducci D Engovatov H Lockhart M Kudo P Humenn S Godik S Anderson S Crocker et almbox.. 2003. extensible access control markup language (xacml) version 1.0. OASIS (2003).  Anne Anderson Anthony Nadalin B Parducci D Engovatov H Lockhart M Kudo P Humenn S Godik S Anderson S Crocker et almbox.. 2003. extensible access control markup language (xacml) version 1.0. OASIS (2003)."},{"key":"e_1_3_2_1_3_1","unstructured":"Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. arXiv preprint arXiv:1702.07521 (2017).  Ferdinand Brasser Urs M\u00fcller Alexandra Dmitrienko Kari Kostiainen Srdjan Capkun and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: SGX Cache Attacks Are Practical. arXiv preprint arXiv:1702.07521 (2017)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053007"},{"key":"e_1_3_2_1_5_1","first-page":"86","article-title":"Intel SGX Explained","volume":"2016","author":"Costan Victor","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_6_1","unstructured":"Trusted Computing Group. {n. d.}. TCG architecture overview. (TCG Specification). (. {n. d.}).  Trusted Computing Group. {n. d.}. TCG architecture overview. (TCG Specification). (. {n. d.})."},{"key":"e_1_3_2_1_7_1","unstructured":"Intel. 2016. Intel\u00ae Software Guard Extensions Remote Attestation End-to-End Example. (2016). https:\/\/software.intel.com\/en-us\/articles\/intel-software-guard-extensions-remote-attestation-end-to-end-example  Intel. 2016. Intel\u00ae Software Guard Extensions Remote Attestation End-to-End Example. (2016). https:\/\/software.intel.com\/en-us\/articles\/intel-software-guard-extensions-remote-attestation-end-to-end-example"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151030.1151053"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Security Symposium","volume":"13","author":"Sailer Reiner","year":"2004"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063979.1064005"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Paul Sevincc Mario Strasser and David Basin. 2007. Securing the distribution and storage of secrets with trusted platform modules. Information Security Theory and Practices. Smart Cards Mobile and Ubiquitous Computing Systems (2007) 53--66.   Paul Sevincc Mario Strasser and David Basin. 2007. Securing the distribution and storage of secrets with trusted platform modules. Information Security Theory and Practices. Smart Cards Mobile and Ubiquitous Computing Systems (2007) 53--66.","DOI":"10.1007\/978-3-540-72354-7_5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating controlled-channel attacks against enclave programs Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS) San Diego CA.  Ming-Wei Shih Sangho Lee Taesoo Kim and Marcus Peinado. 2017. T-SGX: Eradicating controlled-channel attacks against enclave programs Proceedings of the 2017 Annual Network and Distributed System Security Symposium (NDSS) San Diego CA.","DOI":"10.14722\/ndss.2017.23193"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"}],"event":{"name":"SACMAT '18: The 23rd ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Indianapolis Indiana USA","acronym":"SACMAT '18"},"container-title":["Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205977.3205990","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3205977.3205990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:02Z","timestamp":1750282862000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3205977.3205990"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,7]]},"references-count":14,"alternative-id":["10.1145\/3205977.3205990","10.1145\/3205977"],"URL":"https:\/\/doi.org\/10.1145\/3205977.3205990","relation":{},"subject":[],"published":{"date-parts":[[2018,6,7]]},"assertion":[{"value":"2018-06-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}