Alder, F., Asokan, N., Kurnikov, A., Paverd, A., Steiner, M.: S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. [Online]. Available: arXiv:1810.06080.pdf (2018)
Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on Ethereum smart contracts. IACR Cryptology ePrint Archive 2016, 1007 (2016). [Online]. Available: http://eprint.iacr.org/2016/1007
Google Scholar
Balacheff, B., Chen, L., Pearson, S., Plaquin, D., Proudler, G.: Trusted Computing Platforms: TCPA Technology in Context. New York, Prentice Hall (2002)
Google Scholar
Birkholz, H., Thaler, D., Richardson, M., Smith, N., Pan, W.: Remote Attestation Procedures Architecture, IETF, Internet-Draft draft-ietf-rats-architecture-07. [Online]. Available: https://datatracker.ietf.org/doc/draft-ietf-rats-architecture/ (2020)
Bitcoin.org, Unspent Transaction Output (UTXO) (2020). Available at https://bitcoin.org/en/glossary/unspent-transaction-output. Accessed 7 May 2020
Brandenburger, M., Cachin, C., Kapitza, R., Sorniotti, A.: Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric. [Online]. Available: https://arxiv.org/pdf/1805.08541.pdf (2018)
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security CCS2004, pp. 132–145. ACM (2004), https://doi.org/10.1145/1030083.1030103
Brickell, E., Li, J.: Enhanced privacy ID: a direct anonymous attestation scheme with enhanced revocation capabilities. IEEE Transactions on Dependable and Secure Computing 9(3), 345–360 (2012)
Article
Google Scholar
Buterin, V.: Proof of Stake FAQ. [Online]. Available: https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ (2019)
Buterin, V.: Ethereum: a Next-Generation Cryptocurrency and Decentralized Application Platform, Bitcoin Magazine, Report. https://bitcoinmagazine.com/articles/ethereum-next-generation-cryptocurrency-decentralized-application-platform-1390528211/ (2014)
Challener, D., Yoder, K., Catherman, R., Safford, D., Van Doorn, L.: Practical Guide to Trusted Computing. New York, IBM Press (2008)
Google Scholar
CCC: Confidential Computing Deep Dive v1.0 - A Publication of The Confidential Computing Consortium, October 2020. [Online]. Available: https://confidentialcomputing.io
CSA: Firmware Integrity in the Cloud Data Center, Cloud Security Alliance (CSA), Whitepaper, 2018. [Online]. Available: https://downloads.cloudsecurityalliance.org/assets/research/firmware/firmware-integrity-in-the-cloud-data-center.pdf
Coker, G., Guttman, J., Loscocco, P., Herzog, A., Millen, J., Ohanlon, B., Ramsdell, J., Ariel, J., Segall, S., Sniffen, B.: Principles of remote attestation. International Journal of Information Security 10, 63–81 (2011). [Online]. Available: https://doi.org/10.1007/s10207-011-0124-7
Article
Google Scholar
Costan, V., Lebedev, I., Devadas, S.: Secure Processors Part I: Background, Taxonomy for Secure Enclaves and Intel SGX Architecture. Boston: Now Publishers Inc. vol. 11, no. 1-2. [Online]. Available: https://doi.org/10.1561/1000000051 (2017)
del Castillo, M. : Citi, Goldman Sachs Conduct First Blockchain Equity Swap On Ethereum-Inspired Platform, Forbes. [Online]. Available: https://www.forbes.com/sites/michaeldelcastillo/2020/02/06/citi-goldman-sachs-conduct-first-blockchain-equity-swap-on-ethereum-inspired-platform(2020)
Dickerson, T., Gazzillo, P., Herlihy, M., Koskinen, E.: Adding concurrency to smart contracts. In: Proceedings of the ACM Symposium on Principles of Distributed Computing PODC’17, pp. 303–312. New York, Association for Computing Machinery (2017). [Online]. Available: https://doi.org/10.1145/3087801.3087835
E. Palmer (Ed.): Attestation of System Components v1.0 - Requirements and Recommendations - Open Compute Project (OCP), November 2020. [Online]. Available: https://www.opencompute.org/projects/security
England, P., Marochko, A., Mattoon, D., Spiger, R., Thom, S., Wooten, D.: RIoT - A Foundation for Trust in the Internet of Things, Microsoft Research, Tech. Rep. MSR-TR-2016-18. [Online]. Available: https://www.microsoft.com/en-us/research/publication/riot-a-foundation-for-trust-in-the-internet-of-things/ (2016)
Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. In: Financial Cryptography and Data Security - 18th International Conference, FC 2014, pp. 436–454 (2014)
Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization. IETF Standard RFC3281. [Online]. Available: http://tools.ietf.org/rfc/rfc3281.txt (2002)
FATF: International Standards on Combating Money Laundering and the Financing of Terrorism and Proliferation, Financial Action Task Force (FATF), FATF Revision of Recommendation 15, October 2018, available at: http://www.fatf-gafi.org/publications/fatfrecommendations/documents/fatf-recommendations.html
Fedorkow, G., Voit, E., Fitzgerald-McKay, J.. In: TPM-based Network Device Remote Integrity Verification, IETF, Internet-Draft draft-fedorkow-rats-network-device-attestation-05. [Online]. Available: https://datatracker.ietf.org/doc/draft-fedorkow-rats-network-device-attestation/ (2020)
Fowler, M.: Available at https://martinfowler.com/articles/serverless.html. Accessed 7 May 2020 (2018)
Gervais, A., Karame, G.O., Capkun, V., Capkun, S.: Is bitcoin a decentralized currency? IEEE Security & Privacy 12(3), 54–60 (2014)
Article
Google Scholar
GlobalPlatform: GlobalPlatform and the Trusted Computing Group Form Work Group to Drive Mobile Security Standards and Solutions, June 2012. [Online]. Available: https://globalplatform.org
Gray, J.: The transaction concept: virtues and limitations. In: Very Large Data Bases – Proceedings of the 7th International Conference, Cannes, France, pp. 144–154 (1981)
Hardjono, T.: Building trust through strong digital identity. Embedded Computing Design: 13–18 (2008)
Hardjono, T.., Smith, N. (Eds.): TCG Infrastructure Reference Architecture for Interoperability (Part 1) – Specification Version 1.0 Rev 1.0, Trusted Computing Group, TCG Published Specification, June 2005. [Online]. Available: https://trustedcomputinggroup.org/wp-content/uploads/IWG_Architecture_v1_0_r1.pdf
Hardjono, T.., Smith, N. (Eds.): TCG Infrastructure Working Group architecture (Part 2) – Integrity Management – Specification Version 1.0 Rev 1.0, Trusted Computing Group, TCG Published Specification, November 2006, Available at http://www.trustedcomputinggroup.org/resources
Hardjono, T.: Federated Authorization over Access to Personal Data for Decentralized Identity Management. In: IEEE Communications Standards Magazine – The Dawn of the Internet Identity Layer and the Role of Decentralized Identity, vol. 3, no. 4. [Online]. Available: https://doi.org/10.1109/MCOMSTD.001.1900019 (2019)
Hardjono, T., Smith, N.: Decentralized Trusted Computing Base for Blockchain Infrastructure Security, Frontiers Journal - Special Issue on Finance, Money & Blockchains, vol. 2. [Online]. Available: https://doi.org/10.3389/fbloc.2019.00024 (2019)
Hardjono, T.: Blockchain Interoperability and Survivability. Presentation 2018 IEEE Global Blockchain Summit, NIST, Gaithersburg, MD (17-19 September 2018) (2018)
Hardjono, T., Pentland, A.: Verifiable Anonymous Identities and Access Control in Permissioned Blockchains, MIT Connection Science & Engineering, Technical Report. Available at arXiv:1903.04584 (2016)
Hardjono, T., Lipton, A., Pentland, A.: Towards an interoperability architecture blockchain autonomous systems. IEEE Transactions on Engineering Management 67 (4), 1298–1309 (2019). [Online]. Available: https://doi.org/10.1109/TEM.2019.2920154
Article
Google Scholar
Hardjono, T., Hargreaves, M., Smith, N.: An Interoperability Architecture for Blockchain Gateways, IETF, Internet-Draft draft-hardjono-blockchain-interop-arch-01. [Online]. Available: https://datatracker.ietf.org/doc/draft-hardjono-blockchain-interop-arch/ (2020)
Hardjono, T., Lipton, A., Pentland, A.: A Contract Service Provider Model for Virtual Assets, in 6th International Workshop on P2P Financial Systems, London. [Online]. Available: arXiv:2009.07413 (2020)
Hardjono, T., Lipton, A., Pentland, A.: Towards a public key management framework for virtual assets and virtual asset service providers. Journal of FinTech 1(1). Available at arXiv:1909.08607. [Online]. Available: https://doi.org/10.1142/S2705109920500017 (2020)
Hardjono, T., Lipton, A., Pentland, A. In: Pentland, A., Lipton, A., Hardjono, T. (eds.) : Interoperability of Distributed Systems, in Building the New Digital Economy. MIT Press, Cambridge (2021)
Herlihy, M.: Blockchains from a distributed computing perspective. Communications of the ACM 62(2), 78–85 (2019). [Online]. Available: https://doi.org/10.1145/3209623
Article
Google Scholar
IBM: IBM Blockchain Platform , IBM Corporation, Technical Overview, September 2019. [Online]. Available: https://www.ibm.com/cloud/blockchain-platform
IETF: Remote ATtestation ProcedureS (RATS) Working Group – Approved Charter, Internet Engineering task Force, March 2019. [Online]. Available: https://datatracker.ietf.org/wg/rats/about/
Kelly, B.: Project Cerberus Security Architecture Overview Specification, Open Compute Project, Published Specifications. [Online]. Available: https://github.com/opencomputeproject/Project_Olympus/blob/master/Project_Cerberus/Project (2017)
Lardinois, F.: Microsoft launches a fully managed blockchain service, Techcrunch. [Online]. Available: https://techcrunch.com/2019/05/02/microsoft-launches-a-fully-managed-blockchain-service/ (2019)
Lear, E., Droms, R., Romascanu, D.: Manufacturer Usage Description (MUD) Specification (RFC8520). [Online]. Available: https://tools.ietf.org/html/rfc8520 (2019)
Lind, J., Naor, O., Eyal, I., Kelbert, F., Pietzuch, P., Sirer, E.G.: Teechain: A Secure Payment Network with Asynchronous Blockchain Access. [Online]. Available: arXiv:1707.05454.pdf (2019)
Lindemann, R., Jones, M.B.: FIDO 2.0: Key Attestation Format, FIDO Alliance, FIDO Alliance Proposed Standard. [Online]. Available: https://fidoalliance.org/specs/fido-v2.0-ps-20150904/fido-key-attestation-v2.0-ps-20150904.html (September 2015)
Lipton, A., Pentland, A.: Breaking the bank. Sci. Am. 318(1), 26–31 (2018)
Article
Google Scholar
Mandyam, G., Lundblade, L., Ballesteros, M., O’Donoghue, J.: The Entity Attestation Token (EAT), IETF, Internet-Draft draft-ietf-rats-eat-03. [Online]. Available: https://datatracker.ietf.org/doc/draft-ietf-rats-eat/ (2020)
McKeen, F., Alexandrovich, I., Anati, I., Caspi, D., Johnson, S., Leslie-Hurd, R., Rozas, C.: Intel software guard extensions (Intel SGX) support for dynamic memory management inside an enclave. In: Proc. Workshop on Hardware and Architectural Support for Security and Privacy (HASP) 2016, Seoul. http://caslab.csl.yale.edu/workshops/hasp2016/program.html (2016)
Miller, R.: IBM teams with Maersk on new blockchain shipping solution, Tech Crunch. [Online]. Available: https://techcrunch.com/2018/08/09/ibm-teams-with-maersk-on-new-blockchain-shipping-solution/ (2018)
Morris, N.: 12 global pharmaceutical firms join EU blockchain consortium PharmaLedger, Ledger Insights. [Online]. Available: https://www.ledgerinsights.com/pharmaledger-pharmaceutical-blockchain-eu/ (2020)
Müller, C., Brandenburger, M., Cachin, C., Felber, P., Göttel, C., Schiavoni, V.: TZ4Fabric: Executing Smart Contracts with ARM TrustZone. [Online]. Available: aarXiv:2008.11601.pdf (2020)
Nakamoto, S.: Bitcoin: a Peer-to-Peer Electronic Cash System. [Online]. Available: https://bitcoin.org/bitcoin.pdf (2008)
OASIS: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, March 2005, available on http://docs.oasisopen.org/security/saml/v2.0/saml-core-2.0-os.pdf
OCP: Open Compute Project, 2020. [Online]. Available: https://www.opencompute.org
Pentland, A.: Building the New Economy: What We Need and How to Get There. In: Pentland, A., Lipton, A., Hardjono, T. (eds.) Building the New Digital Economy. MIT Press (2021)
Protocol Labs: Inter Planetary File System (IPFS) (2019). Available at https://docs.ipfs.io. Accessed 23 September 2019
Proudler, G., Chen, L., Dalton, C.: Trusted Computing Platforms: TPM2.0 in Context. New York, Springer (2014)
Book
Google Scholar
Regenscheid, A.: Platform Firmware Resiliency Guidelines, National Institute of Standards and Technology, NIST Publication SP 800-193. [Online]. Available: https://csrc.nist.gov/publications/detail/sp/800-193/final (2018)
Rosenstein, M.A., Geer, D.E., Levine, P.J.: The athena service management system. In: Proceedings of the USENIX Winter Conference. Dallas, Texas, USA, January 1988, pp. 203–211. USENIX Association (1988)
Saltzer, J.H.: Protection and the control of information sharing in MULTICS. Commun. ACM 17(7), 388–402 (1974)
Article
Google Scholar
Siegel, D.: Understanding the DAO Attack, Coindesk. [Online]. Available: https://www.coindesk.com/understanding-dao-hack-journalists (2016)
Smith, N. (Ed.): TCG Attestation framework, Trusted Computing Group. TCG Draft Specification – Version 1.0, November 2020
Steiner, J.G., Neuman, B.C., Schiller, J.I.: Kerberos: an authentication service for open network systems. In: Proceedings of the USENIX Winter Conference. dallas, Texas, USA, January 1988, pp. 191–202 (1988)
Sturzenegger, D., Sardon, A., Deml, S., Hardjono, T.: Confidential Computing for Privacy-Preserving Contact Tracing. [Online]. Available: arXiv:2006.14235.pdf (2020)
Traiger, I.L., Gray, J., Galtieri, C.A., Lindsay, B.G.: Transactions and Consistency in Distributed Database Systems. IBM Research Report. vol. RJ2555 (1979)
TCG: Trusted Computing Group. http://www.trustedcomputinggroup.org
TCG: Attestations Working Group, Trusted Computing Group, March 2020. [Online]. Available: https://members.trustedcomputinggroup.org
TCG: TCG Remote Integrity Verification (RIV): Network Equipment Remote Attestation System Version 1.0, Rev. 0.9b, Trusted Computing Group, TCG Draft Specifications, June 2019. [Online]. Available: https://trustedcomputinggroup.org/wp-content/uploads/TCG-NetEq-Attestation-Workflow-Outline_v1r9b_pubrev.pdf
TCG: TCG Implicit Identity Based Device Attestation Version 1.0, Rev. 0.93, Trusted Computing Group, TCG Published Specifications, March 2018. [Online]. Available: https://trustedcomputinggroup.org/wp-content/uploads/TCG-DICE-Arch-Implicit-Identity-Based-Device-Attestation-v1-rev93.pdf
TCG: TCG Symmetric Identity Based Device Attestation Version 1.0, Rev. 0.95, Trusted Computing Group, TCG Published Specifications, January 2020. [Online]. Available: https://trustedcomputinggroup.org/wp-content/uploads/TCG_DICE_SymIDAttest_v1_r0p95_pub-1.pdf
Trusted Computing Group: TPM Main – Part 1 Design Principles – Specification Version 1.2, Trusted Computing Group, TCG Published Specification, October 2003, available at http://www.trustedcomputinggroup.org/resources/tpm_main_specification
Voit, E.: Trusted Path Routing using Remote Attestation, IETF, Internet-Draft draft-voit-rats-trusted-path-routing-01. [Online]. Available: https://datatracker.ietf.org/doc/draft-voit-rats-trusted-path-routing/ (2020)
Weber, A.: Lagarde Says Her ‘Hunch’ is That ECB Will Adopt Digital Currency, Bloomberg. [Online]. Available: https://www.bloomberg.com/news/articles/2020-11-12/lagarde-says-her-hunch-is-that-ecb-will-adopt-digital-currency (2020)
Wikipedia, Stack Machine (2020). Available at https://en.wikipedia.org/wiki/Stack_machine, Accessed 7 May 2020
Yaga, D., Mell, P., Roby, N., Scarfone, K.: Blockchain technology overview. National Institute of Standards and Technology Internal Report 8202. https://doi.org/10.6028/NIST.IR.8202 (2018)
Zic, J., Hardjono, T.: Towards a cloud-based integrity measurement service. Journal of Cloud Computing: Advances, Systems and Applications (2013)