Proceedings of the Twentieth ACM Symposium on Operating Systems Principles 2005
DOI: 10.1145/1095810.1118613
|View full text |Cite
|
Sign up to set email alerts
|

Nexus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
2
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(4 citation statements)
references
References 6 publications
2
2
0
Order By: Relevance
“…Trusted Platform Modules [31] and attestation [12] can provide strong credentials for certifying the presence of remote software stacks. Fine-grained attestation [27] or attested labels [28] might also fit well with our notion of privileges. However, there still must be a service, perhaps an authentication agent as described in [33] that is capable of offering and checking credentials for named principals as part of remote authentication.…”
Section: Remote Principalssupporting
confidence: 63%
“…Trusted Platform Modules [31] and attestation [12] can provide strong credentials for certifying the presence of remote software stacks. Fine-grained attestation [27] or attested labels [28] might also fit well with our notion of privileges. However, there still must be a service, perhaps an authentication agent as described in [33] that is capable of offering and checking credentials for named principals as part of remote authentication.…”
Section: Remote Principalssupporting
confidence: 63%
“…Trusted Platform Modules [31] and attestation [12] can provide strong credentials for certifying the presence of remote software stacks. Fine-grained attestation [27] or attested labels [28] might also fit well with our notion of privileges. However, there still must be a service, perhaps an authentication agent as described in [33] that is capable of offering and checking credentials for named principals as part of remote authentication.…”
Section: Remote Principalssupporting
confidence: 63%
“…Many solutions have been proposed to improve the protection [5][6][7][8][9][10][11][12][13]. In general, they can be categorized into three types: technology, policy, and education.…”
Section: X-axis: Countermeasuresmentioning
confidence: 99%
“…Several researchers have studied the implementation of trustworthy systems [5][6][7][8][9][10][11][12][13]. However, we have observed that trustworthiness could not be achieved if there is no trusted integration of major network components.…”
Section: Introductionmentioning
confidence: 98%