Abstract is missing.
- Scalable trust: engineering challenge or complexity barrier?Kenneth P. Birman. 1-2 [doi]
- Scalable group communication system for scalable trustKrzysztof Ostrowski, Kenneth P. Birman. 3-6 [doi]
- A protocol for property-based attestationLiqun Chen, Rainer Landfermann, Hans Löhr, Markus Rohe, Ahmad-Reza Sadeghi, Christian Stüble. 7-16 [doi]
- Layering negotiations for flexible attestationYasuharu Katsuno, Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo. 17-20 [doi]
- Linking remote attestation to secure tunnel endpointsKenneth Goldman, Ronald Perez, Reiner Sailer. 21-24 [doi]
- The role of trusted computing in internet scale DRMGeoffrey Strongin. 25-26 [doi]
- Virtual monotonic counters and count-limited objects using a TPM without a trusted OSLuis F. G. Sarmenta, Marten van Dijk, Charles W. O Donnell, Jonathan Rhodes, Srinivas Devadas. 27-42 [doi]
- Daonity: grid security with behaviour conformity from trusted computingWenbo Mao, Fei Yan, Chunrun Chen. 43-46 [doi]
- TCG inside?: a note on TPM specification complianceAhmad-Reza Sadeghi, Marcel Selhorst, Christian Stüble, Christian Wachsmann, Marcel Winandy. 47-56 [doi]