Skip to main content
  • 446 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

9.7 Further Reading

  1. D. Asonov and J. Freytag. Almost Optimal Private Information Retrieval. In Privacy Enhancing Technologies—PET 2002, pages 209–223. Springer-Verlag LNCS 2482, 2003.

    Google Scholar 

  2. D. Asnonov. Querying Databases Privately: A New Approach to Private Information Retrieval. Springer-Verlag LNCS 3128, 2004.

    Google Scholar 

  3. A. Iliev and S.W. Smith. Privacy-Enhanced Credential Services. In 2nd Annual PKI Research Workshop. NIST/NIH/Internet2, April 2003.

    Google Scholar 

  4. A. Iliev and S.W. Smith. Prototyping an Armored Data Vault: Rights Management for Big Brother’s Computer. In Privacy Enhancing Technologies-PET 2002, pages 144–159. Springer-Verlag LNCS 2482, 2003.

    Google Scholar 

  5. A. Iliev and S.W. Smith. Enhancing User Privacy via Trusted Computing at the Server: Two Case Studies. IEEE Security and Privacy, 2004. Accepted for publication.

    Google Scholar 

  6. A. Iliev and S.W. Smith. Private Information Storage with Logarithmic-space Secure Hardware. In Information Security Management, Education, and Privacy, pages 201–216. Kluwer, 2004.

    Google Scholar 

  7. S. Jiang. WebALPS Implementation and Performance Analysis: Using Trusted Co-servers to Enhance Privacy and Security of Web Interactions. Master’s thesis, Dartmouth College Department of Computer Science, June 2001.

    Google Scholar 

  8. S. Jiang, S.W. Smith, and K. Minami. Securing Web Servers against Insider Attack. In Seventeenth Annual Computer Security Applications Conference, pages 265–276. IEEE Computer Society, 2001.

    Google Scholar 

  9. E. Rescorla. SSL and TLS: Designing and Building Secure Systems. Addison-Wesley, 2000.

    Google Scholar 

  10. S.W. Smith. WebALPS: A Survey of E-Commerce Privacy and Security Applications. ACM SIGecom Exchanges, 2.3:27–34, September 2001.

    Google Scholar 

  11. S. W. Smith and D. Safford. Practical Server Privacy Using Secure Coprocessors. IBM Systems Journal, 40:683–695, 2001.

    Article  Google Scholar 

Download references

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer Science + Business Media, Inc.

About this chapter

Cite this chapter

(2005). Application Case Studies. In: Trusted Computing Platforms: Design and Applications. Springer, Boston, MA. https://doi.org/10.1007/0-387-23917-0_9

Download citation

  • DOI: https://doi.org/10.1007/0-387-23917-0_9

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-23916-3

  • Online ISBN: 978-0-387-23917-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics