TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing
Abstract
References
Recommendations
Trusted computing and provenance: better together
TAPP'10: Proceedings of the 2nd conference on Theory and practice of provenanceIt is widely realised that provenance systems can benefit from greater awareness of security principles and the use of security technology. In this paper, we argue that Trusted Computing, a hardware-based method for establishing platform integrity, is ...
Trusted platform-as-a-service: a foundation for trustworthy cloud-hosted applications
CCSW '11: Proceedings of the 3rd ACM workshop on Cloud computing security workshopThe applications we use are increasingly packaged as network services running in the cloud under the control of a service provider. Users of these services have no basis to determine if these services are trustworthy, beyond the assurances of the ...
Trusted Cloud Computing Architectures for infrastructure as a service: Survey and systematic literature review
AbstractCloud computing is no longer the future but the present. Security and trust are critical in cloud computing, but how can cloud service tenants trust cloud service providers to store all their private data on the cloud? Trusted ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
![cover image Guide Proceedings](/cms/asset/75e74ce2-aba4-4f3f-83a4-b3ba794b3ab9/978-3-319-94289-6.cover.jpg)
Publisher
Springer-Verlag
Berlin, Heidelberg
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0