{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:28:39Z","timestamp":1761708519155,"version":"3.38.0"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2011,5,1]],"date-time":"2011-05-01T00:00:00Z","timestamp":1304208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2011,5]]},"DOI":"10.1109\/tdsc.2010.11","type":"journal-article","created":{"date-parts":[[2010,4,9]],"date-time":"2010-04-09T12:53:11Z","timestamp":1270817591000},"page":"321-336","source":"Crossref","is-referenced-by-count":18,"title":["A Policy Enforcing Mechanism for Trusted Ad Hoc Networks"],"prefix":"10.1109","volume":"8","author":[{"family":"Gang Xu","sequence":"first","affiliation":[]},{"given":"C","family":"Borcea","sequence":"additional","affiliation":[]},{"given":"L","family":"Iftode","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2704"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2001.991547"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/168588.168603"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/352600.353052"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.1.1.1-13"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/778415.778422"},{"key":"ref8","first-page":"10","article-title":"Unified Support for Heterogeneous Security Policies in Distributed Systems","volume-title":"Proc. Seventh USENIX Security Symp.","author":"Minsky"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/352591.352592"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36124-3_21"},{"article-title":"Enforcement of Communal Policies for Peer-to-Peer Systems","volume-title":"Proc. Sixth Int\u2019l Conf. Coordination Models and Languages","author":"Ionescu","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2006.47"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.26"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428672"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/srds.2006.42"},{"year":"2010","key":"ref16","article-title":"Trusted Computing Group, \u201cTCG 1.1b Specifications,\u201d"},{"article-title":"Use Case Scenarios\u2014v 2.7","volume-title":"Trusted Computing Group\u2014Mobile Phone Working Group","year":"2005","key":"ref17"},{"year":"2010","key":"ref18","article-title":"The Network Simulator\u2014NS2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209219"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/VETECS.2004.1391464"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"article-title":"Public Key Infrastructure Study Final Report","year":"1994","author":"Berkovits","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.11.013"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1179474.1179481"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/65.806983"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/S0140-3664(00)00249-8"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2001.992905"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/mahss.2004.1392183"},{"article-title":"Finding Collisions in the Full SHA1","volume-title":"Proc. Int\u2019l Conf. Advances in Cryptology (Crypto)","author":"Wang","key":"ref34"},{"volume-title":"\u201cThe netfilter\/iptables Project,\u201d","year":"2010","key":"ref35"},{"volume-title":"\u201cAtmel TPM,\u201d","year":"2010","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2014455"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/288235.288256"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313525"},{"article-title":"Oslo: Improving the Security of Trusted Computing","volume-title":"Proc. 16th USENIX Security Symp.","author":"Kauer","key":"ref40"},{"year":"2005","key":"ref41","article-title":"Secure Virtual Machine Architecture Reference Manual"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.25"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.25"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506428"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/fits.2003.1264934"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.824959"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2006-14601"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030125"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(98)00019-X"},{"article-title":"Introduction to the Citadel Architecture: Security in Physically Exposed Environments","year":"1991","author":"White","key":"ref51"},{"article-title":"Using Secure Coprocessors","year":"1994","author":"Yee","key":"ref52"},{"key":"ref53","first-page":"23","article-title":"Certifying Program Execution with Secure Processors","volume-title":"Proc. Ninth Workshop Hot Topics in Operating Systems","author":"Chen"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.21236\/ADA419599"},{"key":"ref55","first-page":"21","article-title":"Establishing the Genuinity of Remote Computer Systems","volume-title":"Proc. 12th USENIX Security Symp.","author":"Kennell"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301329"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095812"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945464"},{"article-title":"Next Generation Secure Computing Base","volume-title":"Microsoft, Corp.","year":"2010","key":"ref59"},{"key":"ref60","first-page":"16","article-title":"Design and Implementation of a TCG-Based Integrity Measurement Architecture","volume-title":"Proc. 13th USENIX Security Symp.","author":"Sailer"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2005.4"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8858\/5730203\/05444889.pdf?arnumber=5444889","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T06:08:23Z","timestamp":1741846103000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5444889\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5]]},"references-count":59,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2010.11","relation":{},"ISSN":["1545-5971"],"issn-type":[{"type":"print","value":"1545-5971"}],"subject":[],"published":{"date-parts":[[2011,5]]}}}