À propos de cet article

Citez

[1] “Trusted computing.” [Online]. Available: http://www.trustedcomputinggroup.org/ Search in Google Scholar

[2] R. Sailer, X. Zhang, T. Jaeger, and L. Van Doorn, “Design and implementation of a tcg-based integrity measurement architecture.” in USENIX Security Symposium, vol. 13, 2004, pp. 223–238. Search in Google Scholar

[3] L. Chen, R. Landfermann, H. Lohr, M. Rohe, A.-R. Sadeghi, and “ C. Stuble, “A protocol for property-based attestation,” in ¨ Proceedings of the first ACM workshop on Scalable trusted computing. ACM, 2006, pp. 7–16. Search in Google Scholar

[4] Sadeghi A, Stüble C. Property-Based attestation for computing platforms: caring about properties, not mechanisms. In: Raskin V, ed. Proc. of the 2004 Workshop on New Security Paradigms. New York: ACM, 2004. 67-77. Search in Google Scholar

[5] T. Rauter, A. Holler, N. Kajtazovic, and C. Kreiner, “Privilege-based ¨ remote attestation: Towards integrity assurance for lightweight clients,” in Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security. ACM, 2015, pp. 3–9. Search in Google Scholar

[6] Luo, W., Liu, W., Luo, Y., Ruan, A., Shen, Q., & Wu, Z. (2016). Partial Attestation : Towards Cost-Effective and Privacy-Preserving Remote Attestations.2016 IEEE Trustcom/BigDataSE/ISPA.IEEE,2016,pp.152 – 159 Search in Google Scholar

[7] Abir Awad; Sara Kadry; Brian Lee; Gururaj Maddodi; Eoin O’Meara. Integrity Assurance in the Cloud by Combined PBA and Provenance.2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST).2016,pp,127-132 Search in Google Scholar

[8] Merkle RC. Protocols for public key cryptosystems. In: Proc. of the IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 1980. 122-134. Search in Google Scholar

[9] Merkle RC. A certified digital signature. In: Brassard G, ed. Proc. of the 9th Annual Int’l Cryptology Conf. on Advances in Cryptology. Heidelberg: Springer-Verlag, 1989. 218-238. Search in Google Scholar

[10] Blum M, Evans W, Gemmell P, Kannan S, Naor M. Checking the correctness of memories. In: Proc. of the 32nd Annual Symp. on Foundations of Computer Science. Washington: IEEE Computer Society, 1991. 90-99. Search in Google Scholar

[11] Gassend B, Suh GE, Clarke D, van Dijk M, Devadas S. Caches and hash trees for efficient memory integrity verification. In: Proc. of the 9th Int’l Symp. on High-Performance Computer Architecture. Washington: IEEE Computer Society, 2003. 295-306. Search in Google Scholar

[12] Xu, Z.-Y., He, Y.-P., & Deng, L.-L. (2011). Efficient Remote Attestation Mechanism with Privacy Protection. Journal of Software, 22(2), 339–352. Search in Google Scholar

eISSN:
2470-8038
Langue:
Anglais
Périodicité:
4 fois par an
Sujets de la revue:
Computer Sciences, other