Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2021
Remote attestation and integrity measurements with Intel SGX for virtual machines
AbstractWith response to the emerging virtualization trend, we focus on a Virtual Machine (VM) remote attestation process assuming that it is running in an uncontrolled and untrusted cloud infrastructure.
We present a solution that ...
- articleJune 2018
A Novel Graph-Based Approach for the Management of Health Data on Cloud-Based WSANs
Journal of Grid Computing (SPJGC), Volume 16, Issue 2Pages 317–344https://doi.org/10.1007/s10723-018-9438-2Nowadays, healthcare applications become among the most important services that help to improve the public safety through, for example, the prevention of the propagation of some epidemic diseases from patient to another or better from a location to ...
- research-articleJune 2015
ASArP
Journal of Information Security and Applications (JISA), Volume 22, Issue CPages 28–39https://doi.org/10.1016/j.jisa.2014.09.001Many enterprise solutions today are built upon complex distributed systems which are accessible to the users globally. Due to this global access, the security of the host platforms becomes critical. The platform administrators use security automation ...
- research-articleNovember 2013
Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques
SIN '13: Proceedings of the 6th International Conference on Security of Information and NetworksPages 136–143https://doi.org/10.1145/2523514.2523537In many new distributed systems paradigms such a cloud computing, Internet of Things (IoT), electronic banking, etc. the security of the host platforms is very critical which is managed by the platform owner. The platform administrators use security ...
- ArticleDecember 2010
A Sheme of Mobile Platform Based on Trusted Computing
CIS '10: Proceedings of the 2010 International Conference on Computational Intelligence and SecurityPages 465–468https://doi.org/10.1109/CIS.2010.154Mobile platform is the foundation to protect the security of mobile application. How to design and implement the trusted and effective mobile platform is the problem need to be resolved. On the basis of comprehensive study of trusted computing ...
- ArticleSeptember 2010
An Approach to Establish Trusted Application
NETAPPS '10: Proceedings of the 2010 Second International Conference on Network Applications, Protocols and ServicesPages 159–164https://doi.org/10.1109/NETAPPS.2010.35Trusted Computing offer great opportunities to enhance security and privacy of the user. Trusted Platform Module (TPM) is the implementation of the trusted platform initiatives on a chip under Trusted Computing Group (TCG). The TPM chip that is similar ...
- ArticleApril 2009
Research on Distributed and Dynamic Trust Transfer and Measurement
NSWCTC '09: Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing - Volume 01Pages 235–239https://doi.org/10.1109/NSWCTC.2009.175To solve many existing problems in integrity measurements of trusted platform, a solution based on DDTVM(Distributed and Dynamic Trust Verifying Mechanism) is put forward, in which the DDTVP (Distributed and Dynamic Trust Verifying Platform) is used to ...
- research-articleJanuary 2009
Providing secure services for a virtual infrastructure
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 43, Issue 1Pages 44–51https://doi.org/10.1145/1496909.1496919Virtualization brings exibility to the data center and enables separations allowing for better security properties. For these security properties to be fully utilized, virtual machines need to be able to connect to secure services such as networking and ...
- research-articleJanuary 2009
Trusted virtual platforms: a key enabler for converged client devices
ACM SIGOPS Operating Systems Review (SIGOPS), Volume 43, Issue 1Pages 36–43https://doi.org/10.1145/1496909.1496918This paper introduces our work around combining machine virtualization technology with Trusted Computing Group technology. We first describe our architecture for reducing and containing the privileged code of the Xen Hypervisor. Secondly we describe our ...
- ArticleDecember 2008
Concerning about Trust of Platform Hardware
PACIIA '08: Proceedings of the 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application - Volume 02Pages 852–856https://doi.org/10.1109/PACIIA.2008.70This paper investigates the hardware trust of a trusted computing platform. Initially, some prior researches are discussed. Based on these researches, we point out that hardware trust is the same important as the software trust in a trusted computing ...
- ArticleNovember 2007
Uclinux: a linux security module for trusted-computing-based usage controls enforcement
STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computingPages 63–70https://doi.org/10.1145/1314354.1314371Usage controls allow the distributor of some information to limit how recipients of that information may use it. The Trusted Computing Group has standardized Trusted Platform Modules (TPMs) that are built into an increasing number of computers and could ...
- ArticleSeptember 2007
On device authentication in wireless networks: present issues and future challenges
TrustBus'07: Proceedings of the 4th international conference on Trust, Privacy and Security in Digital BusinessPages 135–144Whilst device authentication must be considered as a cardinal security issue, complementary and of equal importance to user authentication, in today's wireless networks, only a few papers address it patchily. This paper identifies and analyses possible ...
- ArticleAugust 2007
Improvement on TCG attestation and its implication for DRM
TCG (Trusted Computing Group) has defined a set of standards. The main features of the standards are protection against theft of secrets held on the platform and a mechanism for the platform to prove that it is in a trusted state, called attestation. ...
- ArticleNovember 2006
Deploying the trusted platform module (TPM) to increased fairness and trust in P2P file sharing servents
ISP'06: Proceedings of the 5th WSEAS International Conference on Information Security and PrivacyPages 202–207A number of P2P file sharing systems have tried to rate the level of contribution and participation of peers in order to avoid free-riding by selfish peers and increased performance and reliability of file sharing among all peers. However, the proposed ...