Trusted computing and open source

Information Security Technical Report - Tập 10 - Trang 74-82 - 2005
David Safford1, Mimi Zohar1
1T.J. Watson Research Center, IBM, P.O. Box 704, Yorktown Heights, NY 10598, USA

Tài liệu tham khảo

Biba, 1977 Fraser, 2000, LOMAC: low water-mark integrity protection for COTS environments Fraser Hall Karger P, Austel V, Toll D. Using a mandatory secrecy and integrity policy on smart cards and mobile devices. EUROSMART Security Conference. Marseilles, France; 13–15 June 2000. p. 134–48. Macdonald Pozzo, 1987, An approach to containing computer viruses, Computers and Security, 6, 321, 10.1016/0167-4048(87)90067-8 Safford, 2003, Take control of TCPA, Linux Journal Safford Safford Sailer, 2004, Design and implementation of a TCG-based integrity measurement architecture SIMC Conference Stüble, 2004 Strasser, 2004 van Doorn Wash