Bridging the Gap between TCPA/Palladium and Personal Security

作者: Christian Stüble , Ahmad-Reza Sadeghi

DOI:

关键词:

摘要:

参考文章(17)
A. Aranganathan, C.D. Suriyakala, The BirliX Security Architecture. Journal of Computer Security. ,vol. 2, pp. 5- 22 ,(2013) , 10.26634/JCS.2.2.2241
Christian Stüble, Michael Waidner, James Riordan, Arnd Weber, Birgit Pfitzmann, The PERSEUS System Architecture Vieweg Verlag. ,(2001)
Ryoichi Mori, Masaji Kawahara, Superdistribution: The Concept and the Architecture IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. ,vol. 73, pp. 1133- 1146 ,(1990)
Tony Leininger, Mario Juarez, Amy Carroll, Julia Polk, Microsoft Palladium: A Business Overview ,(2002)
James L. Antonakos, The pentium microprocessor ,(1996)
Fred B. Schneider, Greg Morrisett, Robert Harper, A Language-Based Approach to Security Lecture Notes in Computer Science. pp. 86- 101 ,(2001) , 10.1007/3-540-44577-3_6
Alma Whitten, J. D. Tygar, WWW electronic commerce and java trojan horses WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 15- 15 ,(1996)
Markus Kuhn, Ross Anderson, Tamper resistance: a cautionary note WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 1- 1 ,(1996)
Paul C. Clark, Lance J. Hoffman, BITS: a smartcard protected operating system Communications of The ACM. ,vol. 37, pp. 66- 70 ,(1994) , 10.1145/188280.188371