System security, platform security and usability
Proceedings of the fifth ACM workshop on Scalable trusted computing
Separating hypervisor trusted computing base supported by hardware
Proceedings of the fifth ACM workshop on Scalable trusted computing
Dynamic enforcement of platform integrity
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Conqueror: tamper-proof code execution on legacy systems
DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
Live and trustworthy forensic analysis of commodity production systems
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
An approach to introducing locality in remote attestation using near field communications
The Journal of Supercomputing
Small trusted primitives for dependable systems
ACM SIGOPS Operating Systems Review
TPM-SIM: a framework for performance evaluation of trusted platform modules
Proceedings of the 48th Design Automation Conference
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
Achieving attestation with less effort: an indirect and configurable approach to integrity reporting
Proceedings of the sixth ACM workshop on Scalable trusted computing
Trust extension as a mechanism for secure code execution on commodity computers
Trust extension as a mechanism for secure code execution on commodity computers
An abstract model of a trusted platform
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
acTvSM: a dynamic virtualization platform for enforcement of application integrity
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
SP 800-147. BIOS Protection Guidelines
SP 800-147. BIOS Protection Guidelines
A hijacker's guide to the LPC bus
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Specification and Standardization of a Java Trusted Computing API
Software—Practice & Experience
A security-focused engineering process for systems of embedded components
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systemss
Practical privacy preserving cloud resource-payment for constrained clients
PETS'12 Proceedings of the 12th international conference on Privacy Enhancing Technologies
Lightweight distributed heterogeneous attested android clouds
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Provenance-Based model for verifying trust-properties
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Securing mobile agents for crisis management support
Proceedings of the seventh ACM workshop on Scalable trusted computing
A hijacker's guide to communication interfaces of the trusted platform module
Computers & Mathematics with Applications
DIMVA'12 Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Hi-index | 0.00 |
Security threats are increasing in volume, diversity, and sophistication at the same time that high-value, sensitive data is more commonly being generated, used, and stored on standard business PCs. While the traditional focus of network protection has been on servers and network access devices, these PCs are typically lightly protected, coupled with the fact that a compromised PC may offer the means to obtain access to servers and other network assets, these characteristics have created an incentive for hackers to focus their efforts on client computing platforms. In Dynamics of a Trusted Platform David Grawrock has updated his highly popular Intel Safer Computing Initiative with new topics covering the latest developments in secure computing. The reader is introduced to the concept of Trusted Computing and the building block approach to designing security into PC platforms. The Intel(r) Trusted Execution Technology (Intel(r) TXT) is one of those building blocks that can be used to create a trusted platform by integrating new security features and capabilities into the processor, chipset, and other platform components.