{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T20:00:05Z","timestamp":1746043205393},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,10]]},"DOI":"10.1109\/srds.2006.42","type":"proceedings-article","created":{"date-parts":[[2006,12,20]],"date-time":"2006-12-20T16:24:59Z","timestamp":1166631899000},"page":"321-336","source":"Crossref","is-referenced-by-count":8,"title":["Satem: Trusted Service Code Execution across Transactions"],"prefix":"10.1109","author":[{"given":"Gang","family":"Xu","sequence":"first","affiliation":[]},{"given":"Cristian","family":"Borcea","sequence":"additional","affiliation":[]},{"given":"Liviu","family":"Iftode","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Next generation secure computing base","year":"0","key":"19"},{"key":"17","article-title":"Establishing the genuinity of remote computer systems","author":"kennell","year":"2003","journal-title":"Proceedings of 12th USENIX Security Symposium"},{"key":"18","article-title":"Architectural support for copy and tamper resistant software","author":"lie","year":"2000","journal-title":"Architectural Support for Programming Languages and Operating Systems"},{"key":"33","article-title":"Using secure co-processors","author":"yee","year":"1994","journal-title":"Technical Report"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/RISP.1990.63835"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CMPCON.1979.729112"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.821527"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/945461.945464"},{"key":"11","article-title":"Understanding data lifetime via whole system simulation","author":"chow","year":"2004","journal-title":"Proceedings of the 13th USENIX Security Symposium"},{"key":"12","article-title":"Xen and the art of virtualization","author":"dragovic","year":"2003","journal-title":"Proceedings of the 19th ACM Symposium on Operating Systems Principles"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/FITS.2003.1264930"},{"key":"20","article-title":"Design and implementation of a TCG-based integrity measurement architecture","author":"sailer","year":"2004","journal-title":"Proceedings of 13th USENIX Security Symposium"},{"key":"22","article-title":"Synthesizing fast intrusion prevention\/detection systems from high-level specifications","author":"sekar","year":"1999","journal-title":"Proc 7th USENIX Security Symposium"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945448"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1145\/1095809.1095812","article-title":"Pioneer: Verifying integrity and guaranteeing execution of code on legacy platforms","author":"seshadri","year":"2005","journal-title":"Proceedings of the 19th ACM Symposium on Operating Systems Principles"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.4"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00019-X"},{"journal-title":"TCG 1 2 Specifications","year":"0","key":"28"},{"key":"29","doi-asserted-by":"crossref","DOI":"10.1109\/52.776948","article-title":"A Recipe for Certifying High Assurance Software","author":"voas","year":"1999","journal-title":"IEEE Software"},{"year":"0","key":"3"},{"year":"0","key":"2"},{"key":"10","article-title":"Certifying program execution with secure processors","author":"chen","year":"2003","journal-title":"Proc Workshop Hot Topics in Operating Systems"},{"year":"0","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1060289.1060307"},{"year":"0","key":"7"},{"year":"0","key":"6"},{"key":"32","article-title":"Introduction to the Citadel architecture: Security in physically exposed environments","author":"white","year":"1991","journal-title":"Technical Report TR"},{"year":"0","key":"5"},{"key":"31","article-title":"Finding collisions in the full SHA1","author":"wang","year":"2005","journal-title":"Proceedings of Crypto"},{"year":"0","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601317"},{"year":"0","key":"8"}],"event":{"name":"2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)","start":{"date-parts":[[2006,10,2]]},"location":"Leeds, UK","end":{"date-parts":[[2006,10,2]]}},"container-title":["2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4032454\/4032455\/04032493.pdf?arnumber=4032493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T08:26:39Z","timestamp":1497687999000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4032493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/srds.2006.42","relation":{},"ISSN":["1060-9857"],"issn-type":[{"type":"print","value":"1060-9857"}],"subject":[],"published":{"date-parts":[[2006,10]]}}}