Proactive secure message transmission in asynchronous networks
Proceedings of the twenty-second annual symposium on Principles of distributed computing
On authenticated computing and RSA-based authentication
Proceedings of the 12th ACM conference on Computer and communications security
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Digital Rights Management in Ubiquitous Computing
IEEE MultiMedia
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
Proceedings of the first ACM workshop on Scalable trusted computing
Improving authentication of remote card transactions with mobile personal trusted devices
Computer Communications
On the power of simple branch prediction analysis
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
The security challenges for mobile ubiquitous services
Information Security Tech. Report
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
Proceedings of the 2007 ACM workshop on Scalable trusted computing
A technical architecture for enforcing usage control requirements in service-oriented architectures
Proceedings of the 2007 ACM workshop on Secure web services
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules
Electronic Notes in Theoretical Computer Science (ENTCS)
OSLO: improving the security of trusted computing
SS'07 Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
Challenges and architectural approaches for authenticating mobile users
Proceedings of the 1st international workshop on Software architectures and mobility
Practical Techniques for Operating System Attestation
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Trusted Computing Serving an Anonymity Service
Trust '08 Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet
Models in Software Engineering
Securing Grid Workflows with Trusted Computing
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
Monitoring and Reputation Mechanisms for Service Level Agreements
GECON '08 Proceedings of the 5th international workshop on Grid Economics and Business Models
A Demonstrative Ad Hoc Attestation System
ISC '08 Proceedings of the 11th international conference on Information Security
Flexible and secure enterprise rights management based on trusted virtual domains
Proceedings of the 3rd ACM workshop on Scalable trusted computing
Behavioral attestation for web services (BA4WS)
Proceedings of the 2008 ACM workshop on Secure web services
Remote attestation on legacy operating systems with trusted platform modules
Science of Computer Programming
A Property-Dependent Agent Transfer Protocol
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Trusted Computing: Security and Applications
Cryptologia
Evolution and challenges in trust and security in information system infrastructures
Proceedings of the 2nd international conference on Security of information and networks
CSNA '07 Proceedings of the IASTED International Conference on Communication Systems, Networks, and Applications
A Privacy Manager for Cloud Computing
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A trusted method for self-profiling in e-commerce
AAMAS'02 Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice
Securing the distribution and storage of secrets with trusted platform modules
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Privacy management in user-centred multi-agent systems
ESAW'06 Proceedings of the 7th international conference on Engineering societies in the agents world VII
FORM: a federated rights expression model for open DRM frameworks
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
Power efficient hardware architecture of SHA-1 algorithm for trusted mobile computing
ICICS'07 Proceedings of the 9th international conference on Information and communications security
Access control based on code identity for open distributed systems
TGC'07 Proceedings of the 3rd conference on Trustworthy global computing
Foundations of security analysis and design IV
Beyond kernel-level integrity measurement: enabling remote attestation for the android platform
TRUST'10 Proceedings of the 3rd international conference on Trust and trustworthy computing
Trusted computing for fault-prone wireless networks
DISC'10 Proceedings of the 24th international conference on Distributed computing
Automatically constructing trusted cluster computing environment
The Journal of Supercomputing
Practitioner's challenges in designing trust into online systems
Journal of Theoretical and Applied Electronic Commerce Research
Features and benefits of trusted computing
2009 Information Security Curriculum Development Conference
Proceedings of the first ACM conference on Data and application security and privacy
Semantic attestation of node integrity in overlays
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Attestation of integrity of overlay networks
Journal of Systems Architecture: the EUROMICRO Journal
Ensuring content integrity for untrusted peer-to-peer content distribution networks
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
Advances in Software Engineering
Towards automated evaluation of trust constraints
iTrust'06 Proceedings of the 4th international conference on Trust Management
Provision of trusted identity management using trust credentials
iTrust'06 Proceedings of the 4th international conference on Trust Management
Dynamic policy discovery with remote attestation
FOSSACS'06 Proceedings of the 9th European joint conference on Foundations of Software Science and Computation Structures
An adaptive privacy management system for data repositories
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
License protection with a tamper-resistant token
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Using secure coprocessors to protect access to enterprise networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Trusted computing: strengths, weaknesses and further opportunities for enhancing privacy
iTrust'05 Proceedings of the Third international conference on Trust Management
Predicting secret keys via branch prediction
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
On leveraging stochastic models for remote attestation
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
A study on scalability of services and privacy issues in cloud computing
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Enhancing privacy in cloud computing via policy-based obfuscation
The Journal of Supercomputing
myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management
Proceedings of the WICSA/ECSA 2012 Companion Volume
Anonymous reputation based reservations in e-commerce (amnesic)
Proceedings of the 13th International Conference on Electronic Commerce
On device-based identity management in enterprises
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Final fantasy: securing on-line gaming with trusted computing
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Behavioral Attestation for Web Services Based Business Processes
International Journal of Web Services Research
Behavioral Attestation for Web Services using access policies
Multimedia Tools and Applications
Proceedings of the 2013 companion publication for conference on Systems, programming, & applications: software for humanity
Hi-index | 0.00 |
As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms, leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forwardBacked by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will.