Policy Driven Remote Attestation View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

Anandha Gopalan , Vaibhav Gowadia , Enrico Scalavino , Emil Lupu

ABSTRACT

Increasingly organisations need to exchange and share data amongst their employees as well as with other organisations. This data is often sensitive and/or confidential, and access to it needs to be protected. Architectures to protect disseminated data have been proposed earlier, but absence of a trusted enforcement point on the end-user machine undermines the system security. The reason being, that an adversary can modify critical software components. In this paper, we present a policy-driven approach that allows us to prove the integrity of a system and which decouples authorisation logic from remote attestation. More... »

PAGES

148-159

Book

TITLE

Security and Privacy in Mobile Information and Communication Systems

ISBN

978-3-642-30243-5
978-3-642-30244-2

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_13

DOI

http://dx.doi.org/10.1007/978-3-642-30244-2_13

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1000718883


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London, 180, Queen\u2019s Gate, SW7 2RH, London, U.K.", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London, 180, Queen\u2019s Gate, SW7 2RH, London, U.K."
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gopalan", 
        "givenName": "Anandha", 
        "id": "sg:person.011430172114.47", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011430172114.47"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London, 180, Queen\u2019s Gate, SW7 2RH, London, U.K.", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London, 180, Queen\u2019s Gate, SW7 2RH, London, U.K."
          ], 
          "type": "Organization"
        }, 
        "familyName": "Gowadia", 
        "givenName": "Vaibhav", 
        "id": "sg:person.013405421541.22", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013405421541.22"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London, 180, Queen\u2019s Gate, SW7 2RH, London, U.K.", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London, 180, Queen\u2019s Gate, SW7 2RH, London, U.K."
          ], 
          "type": "Organization"
        }, 
        "familyName": "Scalavino", 
        "givenName": "Enrico", 
        "id": "sg:person.015527627741.84", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015527627741.84"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computing, Imperial College London, 180, Queen\u2019s Gate, SW7 2RH, London, U.K.", 
          "id": "http://www.grid.ac/institutes/grid.7445.2", 
          "name": [
            "Department of Computing, Imperial College London, 180, Queen\u2019s Gate, SW7 2RH, London, U.K."
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lupu", 
        "givenName": "Emil", 
        "id": "sg:person.013404167044.28", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "Increasingly organisations need to exchange and share data amongst their employees as well as with other organisations. This data is often sensitive and/or confidential, and access to it needs to be protected. Architectures to protect disseminated data have been proposed earlier, but absence of a trusted enforcement point on the end-user machine undermines the system security. The reason being, that an adversary can modify critical software components. In this paper, we present a policy-driven approach that allows us to prove the integrity of a system and which decouples authorisation logic from remote attestation.", 
    "editor": [
      {
        "familyName": "Prasad", 
        "givenName": "Ramjee", 
        "type": "Person"
      }, 
      {
        "familyName": "Farkas", 
        "givenName": "K\u00e1roly", 
        "type": "Person"
      }, 
      {
        "familyName": "Schmidt", 
        "givenName": "Andreas U.", 
        "type": "Person"
      }, 
      {
        "familyName": "Lioy", 
        "givenName": "Antonio", 
        "type": "Person"
      }, 
      {
        "familyName": "Russello", 
        "givenName": "Giovanni", 
        "type": "Person"
      }, 
      {
        "familyName": "Luccio", 
        "givenName": "Flaminia L.", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-30244-2_13", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-30243-5", 
        "978-3-642-30244-2"
      ], 
      "name": "Security and Privacy in Mobile Information and Communication Systems", 
      "type": "Book"
    }, 
    "keywords": [
      "remote attestation", 
      "critical software components", 
      "policy-driven approach", 
      "software components", 
      "enforcement points", 
      "disseminated data", 
      "system security", 
      "attestation", 
      "adversary", 
      "architecture", 
      "security", 
      "logic", 
      "data", 
      "access", 
      "organization", 
      "system", 
      "integrity", 
      "point", 
      "components", 
      "reasons", 
      "employees", 
      "undermines", 
      "paper", 
      "approach", 
      "absence"
    ], 
    "name": "Policy Driven Remote Attestation", 
    "pagination": "148-159", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1000718883"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-30244-2_13"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-30244-2_13", 
      "https://app.dimensions.ai/details/publication/pub.1000718883"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:59", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_424.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-30244-2_13"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_13'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_13'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_13'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-30244-2_13'


 

This table displays all metadata directly associated to this object as RDF triples.

130 TRIPLES      22 PREDICATES      50 URIs      43 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-30244-2_13 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author N2f90b77713c44b938d178ea39a1acb26
4 schema:datePublished 2012
5 schema:datePublishedReg 2012-01-01
6 schema:description Increasingly organisations need to exchange and share data amongst their employees as well as with other organisations. This data is often sensitive and/or confidential, and access to it needs to be protected. Architectures to protect disseminated data have been proposed earlier, but absence of a trusted enforcement point on the end-user machine undermines the system security. The reason being, that an adversary can modify critical software components. In this paper, we present a policy-driven approach that allows us to prove the integrity of a system and which decouples authorisation logic from remote attestation.
7 schema:editor N0c22e6454e6541e8a72e33e9d802eecc
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf N620829935c354bc6a6e4e5cd8b75baff
11 schema:keywords absence
12 access
13 adversary
14 approach
15 architecture
16 attestation
17 components
18 critical software components
19 data
20 disseminated data
21 employees
22 enforcement points
23 integrity
24 logic
25 organization
26 paper
27 point
28 policy-driven approach
29 reasons
30 remote attestation
31 security
32 software components
33 system
34 system security
35 undermines
36 schema:name Policy Driven Remote Attestation
37 schema:pagination 148-159
38 schema:productId N10d828be98a6480da96724133ea7dfde
39 Nef477be1b78c4b4aad37e801240daf78
40 schema:publisher Ne1b2e5ca1b3b400caff53a8f856ad880
41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000718883
42 https://doi.org/10.1007/978-3-642-30244-2_13
43 schema:sdDatePublished 2022-10-01T06:59
44 schema:sdLicense https://scigraph.springernature.com/explorer/license/
45 schema:sdPublisher Nbb5d2bd4f4144b3b86f2859b5f2abd85
46 schema:url https://doi.org/10.1007/978-3-642-30244-2_13
47 sgo:license sg:explorer/license/
48 sgo:sdDataset chapters
49 rdf:type schema:Chapter
50 N09ebba8544394386ac57c59677061ed5 rdf:first Nd88d40ca8d204893a9d0be85e2f3c4fe
51 rdf:rest N2a6f66551f5b4fe9a0ab5eebb4d440ae
52 N0c22e6454e6541e8a72e33e9d802eecc rdf:first Nd1c9c8f91a474efdbde470acff8eb60b
53 rdf:rest Ne430c576402e45e98d19dbb9ce5ef94b
54 N10d828be98a6480da96724133ea7dfde schema:name doi
55 schema:value 10.1007/978-3-642-30244-2_13
56 rdf:type schema:PropertyValue
57 N2a6f66551f5b4fe9a0ab5eebb4d440ae rdf:first N343c5fc40b3543518e06a156847c1a29
58 rdf:rest rdf:nil
59 N2f90b77713c44b938d178ea39a1acb26 rdf:first sg:person.011430172114.47
60 rdf:rest N53c737ffc91a4ff9b9f03721213168a6
61 N343c5fc40b3543518e06a156847c1a29 schema:familyName Luccio
62 schema:givenName Flaminia L.
63 rdf:type schema:Person
64 N3a94b98effd742b2bfa513e103ce538b rdf:first Nbc48ae8d82a44eeb9afca18ae9f0da2c
65 rdf:rest N09ebba8544394386ac57c59677061ed5
66 N53c737ffc91a4ff9b9f03721213168a6 rdf:first sg:person.013405421541.22
67 rdf:rest N6429fa4cac144a8bbe661d0a1f119455
68 N620829935c354bc6a6e4e5cd8b75baff schema:isbn 978-3-642-30243-5
69 978-3-642-30244-2
70 schema:name Security and Privacy in Mobile Information and Communication Systems
71 rdf:type schema:Book
72 N6429fa4cac144a8bbe661d0a1f119455 rdf:first sg:person.015527627741.84
73 rdf:rest N756dedf26e6a40ebb51c2bc5137864e2
74 N756dedf26e6a40ebb51c2bc5137864e2 rdf:first sg:person.013404167044.28
75 rdf:rest rdf:nil
76 N8df6b5c959104e2aaadb8404347cd8aa rdf:first Nfee420641640459d96535d77e900b15e
77 rdf:rest N3a94b98effd742b2bfa513e103ce538b
78 Nbb5d2bd4f4144b3b86f2859b5f2abd85 schema:name Springer Nature - SN SciGraph project
79 rdf:type schema:Organization
80 Nbc48ae8d82a44eeb9afca18ae9f0da2c schema:familyName Lioy
81 schema:givenName Antonio
82 rdf:type schema:Person
83 Nd1c9c8f91a474efdbde470acff8eb60b schema:familyName Prasad
84 schema:givenName Ramjee
85 rdf:type schema:Person
86 Nd88d40ca8d204893a9d0be85e2f3c4fe schema:familyName Russello
87 schema:givenName Giovanni
88 rdf:type schema:Person
89 Ne1b2e5ca1b3b400caff53a8f856ad880 schema:name Springer Nature
90 rdf:type schema:Organisation
91 Ne430c576402e45e98d19dbb9ce5ef94b rdf:first Nfc88838bbacf45ffbfc54202e15f5fb8
92 rdf:rest N8df6b5c959104e2aaadb8404347cd8aa
93 Nef477be1b78c4b4aad37e801240daf78 schema:name dimensions_id
94 schema:value pub.1000718883
95 rdf:type schema:PropertyValue
96 Nfc88838bbacf45ffbfc54202e15f5fb8 schema:familyName Farkas
97 schema:givenName Károly
98 rdf:type schema:Person
99 Nfee420641640459d96535d77e900b15e schema:familyName Schmidt
100 schema:givenName Andreas U.
101 rdf:type schema:Person
102 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
103 schema:name Information and Computing Sciences
104 rdf:type schema:DefinedTerm
105 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
106 schema:name Computer Software
107 rdf:type schema:DefinedTerm
108 sg:person.011430172114.47 schema:affiliation grid-institutes:grid.7445.2
109 schema:familyName Gopalan
110 schema:givenName Anandha
111 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011430172114.47
112 rdf:type schema:Person
113 sg:person.013404167044.28 schema:affiliation grid-institutes:grid.7445.2
114 schema:familyName Lupu
115 schema:givenName Emil
116 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013404167044.28
117 rdf:type schema:Person
118 sg:person.013405421541.22 schema:affiliation grid-institutes:grid.7445.2
119 schema:familyName Gowadia
120 schema:givenName Vaibhav
121 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013405421541.22
122 rdf:type schema:Person
123 sg:person.015527627741.84 schema:affiliation grid-institutes:grid.7445.2
124 schema:familyName Scalavino
125 schema:givenName Enrico
126 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015527627741.84
127 rdf:type schema:Person
128 grid-institutes:grid.7445.2 schema:alternateName Department of Computing, Imperial College London, 180, Queen’s Gate, SW7 2RH, London, U.K.
129 schema:name Department of Computing, Imperial College London, 180, Queen’s Gate, SW7 2RH, London, U.K.
130 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...