Skip to main content

New Horizons

  • Chapter
  • 452 Accesses

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

12.7 Further Reading

  1. [GPC+03]_T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A Virtual Machine-Based Platform for Trusted Computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), pages 193–206, 2003.

    Google Scholar 

  2. T. Halfhill. ARM Dons Armor: TrustZone Security Extensions Strengthen ARMv6 Architecture. Microprocessor Report 8/25/03-01, August 2003.

    Google Scholar 

  3. H. Levy. Capability-Based Computer Systems. Digital Press, 1984. Out of print, but a free online copy lives at http://www.cs.washington.edu/homes/levy/capabook/.

    Google Scholar 

  4. D. Lie, C. Thekkath, and M. Horowitz. Implementing an Untrusted Operating System on Trusted Hardware. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP 2003), pages 178–192, 2003.

    Google Scholar 

  5. Microsoft Next-Generation Secure Computing Base-Technical FAQ. Microsoft TechNet, July 2003.

    Google Scholar 

  6. [SCG+03b]_G. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas. AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing. In Proceedings of the 17th International Conference on Supercomputing, pages 160–171, 2003.

    Google Scholar 

  7. Security Model for the Next-Generation Secure Computing Base. Windows Platform Design Notes, 2003.

    Google Scholar 

  8. N. Stam. Inside Intel’s Secretive ‘LaGrande’ Project. http://www.extremetech.com/, September 2003.

    Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science + Business Media, Inc.

About this chapter

Cite this chapter

(2005). New Horizons. In: Trusted Computing Platforms: Design and Applications. Springer, Boston, MA. https://doi.org/10.1007/0-387-23917-0_12

Download citation

  • DOI: https://doi.org/10.1007/0-387-23917-0_12

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-23916-3

  • Online ISBN: 978-0-387-23917-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics