References
- Andreas Pashalidis and Chris Mitchell, "Single sign-on using trusted platform," in Proc. of 6th Int. Conf. on Information Security, pp.54-68, Oct.2003.
- Reiner Sailer, Xiaolan Zhang, Trent Jaeger and Leendert van Doorn, "Design and implementation of a TCG-based Integrity Measurement Architecture," in Proc. of 13th USENIX Security Symposium, pp.223-238, Aug.2004.
- T. A. Parker, "Single sign-on systems-the technologies and the products," in Proc. of European Convention on Security and Detection, pp.151-155, May.1995.
- Andreas Pashalidis and Chris Mitchell, "A taxonomy of single sign-on systems," in Proc. of 8th Australian Conf. on Information Security and Privacy, pp.249-264, Jul.2003.
- R. Oppliger, "Microsoft .net passport: A security analysis," IEEE Computer, vol.36, no.7, pp-29-35, Jul.2003. https://doi.org/10.1109/MC.2003.1212687
- Liberty Alliance Project. http://www.projectliberty.org/
- Mark Needleman, "The shibboleth authentication/ authorization system," Journal Serials Review, vol.30, no.3, pp.252-253, Aug.2004. https://doi.org/10.1016/j.serrev.2004.05.006
- Trusted Computing Group (TCG). http://www.trustedcomputinggroup.org
- Sandeep Bajikar, "Trusted Platform Module (TPM) based Security on Notebooks PCs-White Paper," Technical Report, Intel Corporation, Jun.2002.
- TCG, "Trusted Computing Group (TCG) specification architecture overview," revision 1.4, pp.11-12, Technical Report, Aug.2007.
- John Hughes and Eve Maler, "Security Assertion Markup Language (SAML) 2.0 technical overview," Technical Report, Jul.2004.
- S. Pearson, Trusted Computing Platforms: TCPA Technology in Context, 1st Edition, Prentice Hall, New Jersey, 2002.
- Trusted Computing Platform Alliance (TCPA): Trusted Platform Module Protection Profile, v 1.9.7, Jul.2002.
- Eimear Gallery and Chris Mitchell, "Trusted computing: security and application," J. Cryptologia, vol. 33, no. 3, pp.217-245, Jul.2009. https://doi.org/10.1080/01611190802231140
- Donald Eastlake and Paul Jones, "RFC 3174 - US Secure Hash Algorithm 1 (SHA1)," September 2001. http://www.openrfc.org/rfc/3174.pdf
- S. Garriss, R. C'aceres, S. Berger, R. Sailer, L. Doorn and X. Zhang, "Towards trustworthy kiosk computing," in Proc. of 8th IEEE Workshop on Mobile Computing Systems and Applications, pp.41-45, Mar.2007.
- Ahmad-Reza Sadeghi and Christian Stuble, "Property-based attestation for computing platforms: caring about properties, not mechanisms," in Proc. of the 2004 Workshop on New Security Paradigms, pp.67-77, Sep. 2004.
- Tamleek Ali and Mohammad Numan, "Incorporating remote attestation for end-to-end protection in web communication paradigm," in Proc. of the 3rd Int. Conf. on Internet Technologies and Applications, Sep.2009.
- Trusted Computing for the java (tm) Platform. http://trustedjava.sourceforge.net/
- TCG, "Trusted Platform Module (TPM) specification v1.2 enhances security," Jun.2004.
- Tim Bray et al., "Extensible markup language (xml)," Technical Report, Aug.1997. http://www.w3pdf.com/W3cSpec/XML/2/REC-xml11-20060816.pdf
- Institute of Applied Information Processing and Communication, Graz University of Technology, Austria. http://www.iaik.tugraz.at/content/about_iaik/
- Massom Alam, Xinwen Zhang, Mohammad Nauman and Tamleek Ali, "Behavioral attestation for web services (BA4WS)," in Proc. of ACM Workshop on Secure Web Services, pp.21-28, Oct.2008.
- David Chaum, "Blind signatures for untraceable payments," in Proc. of Crypto '82, pp.199-203, 1982.
- Zubair Ahmad Khattak, Jamalul-lail Ab Manan and Suziah Sulaiman, "Analysis of open environment sign-in schemes- privacy enhanced & trustworthy approach," Journal Advances in Information Technology, vol.2, no.2, pp.109-121, 2011.
- Arkajit Dey and Stephen Weis, "PseudoID: Enhancing privacy in federated login," in Proc. of the 10th Hot Topics in Privacy Enhancing Technologies, pp.95-107, Jul.2010.
- Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali and Jean-Pierre Seifert, "Model-based behavioral attestation," in Proc. of the 13th ACM Symposium on Access Control Models and Technologies, pp.175-184, Jun.2012.
- Erine Brickell, Jan Camenisch and Liqun Chen, "Direct anonymous attestation," in Proc. of the 11th ACM conference on Computer and communications security, pp. 132-145, Oct.2004.
- Jaehong Park and Ravi Sandhu, "Towards usage control models: beyond traditional access control," in Proc. of the 7th ACM Symposium on Access Control Models and Technologies, pp. 57-64, Jun.2002.
- Zubair Ahmad Khattak, Jamalul-lail Ab Manan and Suziah Sulaiman, "Proof of concept implementation of trustworthy mutual attestation architecture for local true SSO," in Proc. of the 10th Int. Conf. on Security and Management, pp. 721-724, Jul. 2011.
- Reiner Sailer, Leendert van Doorn and James Ward, "The Role of TPM in Enterprise Security," Technical Report, IBM Research, Oct.2004.
- S. Balfe, E. Gallery, C. Mitchell and K. Paterson, "Crimeware and Trusted Computing," in Crimeware Understanding New Attacks and Defenses, pp. 457-472, Apr.2008.
- Jing Zhan, Huanguo Zhang and Fei Yan, "Building Trusted Sub-domain for the Grid with trusted computing," in 3rd SKLOIS Conf. on Information Security and Cryptology, pp. 463-471, Sep.2007.
- Ramon Caceres and Reiner Sailer, "Trusted mobile computing," in Proc. of IFIP Networking Workshop on Security and Privacy in Mobile and Wireless Networking, May 2006.
- Z. A. Khattak, J-L. Manan and S. Sulaiman, "Security, trust and privacy framework for federated single sign-on environment," in Proc. of the 5th Int. Conf. on Information Technology and Multimedia, pp. 1-6, Nov.2011.
- Mittal Bhiogade, "Secure Socket Layer," in Proc. of the Informing Science and Information Technology Education Conference, pp. 85-90, Jun.2002.