iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1002/CPE.7463
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,21]],"date-time":"2023-08-21T04:48:23Z","timestamp":1692593303952},"reference-count":39,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T00:00:00Z","timestamp":1668211200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2023,1,25]]},"abstract":"Summary<\/jats:title>With the continuous maturity and development of single hardware security mechanism, it has been widely used in the field of information technology, but the single hardware mechanism has insufficient security guarantee in its own supporting drivers and other key programs. In response to this problem, this article proposes a trusted isolation model based on the noninterference theory and gives a formal proof. The realization is based on the trusted platform control module (TPCM) hardware mechanism by introducing a secure memory bar to provide a way to achieve a trusted dual\u2010system isolation guarantee. The hardware interface of secure memory module is consistent with that of ordinary memory module, which is widely used. It can improve the security guarantee ability of trusted computing platform, and has a good reference value for the design and application of trusted computing platform equipment.<\/jats:p>","DOI":"10.1002\/cpe.7463","type":"journal-article","created":{"date-parts":[[2022,11,12]],"date-time":"2022-11-12T08:20:22Z","timestamp":1668241222000},"update-policy":"http:\/\/dx.doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A noninterference trusted dual system security guarantee method based on secure memory"],"prefix":"10.1002","volume":"35","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1659-091X","authenticated-orcid":false,"given":"Yu","family":"Hong","sequence":"first","affiliation":[{"name":"Faculty of Information Technology Beijing University of Technology Beijing China"}]},{"given":"Yi","family":"Li","sequence":"additional","affiliation":[{"name":"R&D Department Montage Technology Co., Ltd. Shanghai China"}]},{"given":"Haining","family":"Tan","sequence":"additional","affiliation":[{"name":"Chief Executive Officer Shenzhen High\u2010Tech Industrial Park Information Network Co., Ltd. Shenzhen China"}]}],"member":"311","published-online":{"date-parts":[[2022,11,12]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.022"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490237"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3145845"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3040019"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.2964552"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.11.025"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17040920"},{"issue":"2","key":"e_1_2_9_9_1","first-page":"241","article-title":"A hybrid blockchain\u2010based identity authentication scheme for multi\u2010WSN","volume":"13","author":"Cui Z","year":"2020","journal-title":"IEEE Trans Services Comput"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5478"},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5464"},{"issue":"7","key":"e_1_2_9_12_1","first-page":"e5182","article-title":"Image encryption based on a single\u2010round dictionary and chaotic sequences in cloud computing","volume":"33","author":"Li Y","year":"2019","journal-title":"Concurr Comput Pract Exp"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000331"},{"issue":"2","key":"e_1_2_9_14_1","first-page":"263","article-title":"DEAL: differentially private auction for blockchain\u2010based microgrids energy trading","volume":"13","author":"Hassan MU","year":"2019","journal-title":"IEEE Trans Services Comput"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2944748"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.060"},{"key":"e_1_2_9_17_1","first-page":"1","volume-title":"International Conference on Trusted Systems","author":"Shi W","year":"2009"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2018.00042"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047813"},{"key":"e_1_2_9_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03213-1"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453648"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3056578"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-018-2294-9"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00339-022-05828-y"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586178"},{"issue":"4","key":"e_1_2_9_26_1","first-page":"1","article-title":"AT\u2010DIFC+: toward adaptive and trust\u2010aware decentralized information flow control","volume":"15","author":"Skandylas C","year":"2021","journal-title":"ACM Trans Autonomous Adapt Syst"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.008"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3003933"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.3233\/FI-2021-2049"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20205729"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-019-00575-7"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2889009"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2020.3017189"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1982.10014"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1984.10019"},{"key":"e_1_2_9_36_1","volume-title":"Noninterference, Transitivity, and Channel\u2010Control Security Policies","author":"Rushby J","year":"1992"},{"key":"e_1_2_9_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3421473.3421478"},{"key":"e_1_2_9_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF49147.2020.00022"},{"key":"e_1_2_9_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2018.04.002"},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-S52858.2021.00032"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.7463","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.7463","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.7463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,20]],"date-time":"2023-08-20T11:03:59Z","timestamp":1692529439000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.7463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,12]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,1,25]]}},"alternative-id":["10.1002\/cpe.7463"],"URL":"http:\/\/dx.doi.org\/10.1002\/cpe.7463","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,12]]},"assertion":[{"value":"2022-03-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-08-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}