모바일 플랫폼용 공통보안핵심 모듈 기술 |
Kim Moo-Seop
(한국전자통신연구원 정보보호연구단 무선보안응용연구팀)
Shin Jin-A (한국전자통신연구원 정보보호연구단 무선보안응용연구팀) Park Young-Soo (한국전자통신연구원 정보보호연구단 무선보안응용연구팀) Jun Sung-Ik (한국전자통신연구원 정보보호연구단 무선보안응용연구팀) |
1 | 'Trusted Computing Group', http://www.trustedcomputinggroup.org |
2 | Reiner Sailer외, Design and Implementation of a TCG-based Integrity Measurement Architecture, 13th Usenix Security Symposium, 2004 |
3 | Trusted Computing Group, Trusted Computing Group Specification Architectural Overview, Revision 1.2, http://www.trustedcomputinggroup.org/downloads/TCG_1_0_Architecture_Overview.pdf |
4 | Trusted Computing Group, TCG TPM Specification Version 1.2, 2004, http://www.trustedcomputinggroup.org/downloads/specifications/mainP1DP_rev85.pdf |
5 | Ross Anderson, 'Trusted Computing' Frequently asked Questions, 2003, http://www.cl.cam.ac.uk/users/rja14/tcpa-faq.html |
6 | R.Sailer 외, 'Design and Implementation of a TCG-Based Integrity Measurement Architecture,' IBM Research Report, 2004 |
7 | Richard Stallman, Can you trust your computer?, 2002. http://www.gnu.org/philosophy/can-you-trust.html |
8 | Siani Pearson, 'Trusted Computing Platforms: TCPA Technology in Context', Prentice Hall, 2003 |
9 | 전성익 외, 'STPM개발 Workshop 자료집', ETRI 무선보안응용연구팀, 2006 |