[KNJIGA][B] Bootstrap** trust in modern computers

B Parno, JM McCune, A Perrig - 2011 - books.google.com
Trusting a computer for a security-sensitive task (such as checking email or banking online)
requires the user to know something about the computer's state. We examine research on …

Beyond kernel-level integrity measurement: enabling remote attestation for the android platform

M Nauman, S Khan, X Zhang, JP Seifert - International Conference on …, 2010 - Springer
Increasing adoption of smartphones in recent times has begun to attract more and more
malware writers towards these devices. Among the most prominent and widely adopted …

[PDF][PDF] Trusted computing and provenance: Better together

J Lyle, A Martin - 2010 - usenix.org
It is widely realised that provenance systems can benefit from greater awareness of security
principles and the use of security technology. In this paper, we argue that Trusted …

Using trusted computing for privacy preserving keystroke-based authentication in smartphones

M Nauman, T Ali, A Rauf - Telecommunication Systems, 2013 - Springer
Smartphones are increasingly being used to store personal information as well as to access
sensitive data from the Internet and the cloud. Establishment of the identity of a user …

Risk-aware usage decision making in highly dynamic systems

L Krautsevich, A Lazouski, F Martinelli… - 2010 Fifth …, 2010 - ieeexplore.ieee.org
Usage control model (UCON) is based on the idea that attributes required for decision-
making can be changed over a period of usage. Since it is not always possible to get a fresh …

Token: Trustable keystroke-based authentication for web-based applications on smartphones

M Nauman, T Ali - Information Security and Assurance: 4th International …, 2010 - Springer
Smartphones are increasingly being used to store personal information as well as to access
sensitive data from the Internet and the cloud. Establishment of the identity of a user …

Design and implementation of an efficient framework for behaviour attestation using n-call slides

R Ismail, TA Syed, S Musa - … of the 8th International Conference on …, 2014 - dl.acm.org
We present design and implementation of behaviour based attestation of an enterprise
centric application. Remote attestation is used to measure the trustworthiness of the target …

Trusted virtual containers on demand

KA Bailey, SW Smith - Proceedings of the fifth ACM workshop on …, 2010 - dl.acm.org
TPM-based trusted computing aspires to use hardware and cryptography to provide a
remote relying party with assurances about the trustworthiness of a computing environment …

Scalable, privacy-preserving remote attestation in and through federated identity management frameworks

T Ali, M Nauman, M Amin… - … Conference on Information …, 2010 - ieeexplore.ieee.org
Creating trustworthy online computing is an important open issue in security research.
Trusted Computing aims to address this problem through the use of remote attestation but …

On leveraging stochastic models for remote attestation

T Ali, M Nauman, X Zhang - International conference on trusted systems, 2010 - Springer
Remote attestation is an essential feature of Trusted Computing that allows a challenger to
verify the trustworthiness of a target platform. Existing approaches towards remote …