[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Choi et al., 2013 - Google Patents

Isolated mini-domain for trusted cloud computing

Choi et al., 2013

View PDF
Document ID
10154658153601196708
Author
Choi J
Park J
Seol J
Maeng S
Publication year
Publication venue
2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing

External Links

Snippet

On the cloud system, guest domains for cloud customers can be attacked by one of administrators with privilege or remote hackers who can compromise management tools. Therefore, the customers need a guarantee that their domains run on the secure …
Continue reading at sites.cc.gatech.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Mofrad et al. A comparison study of intel SGX and AMD memory encryption technology
Buhren et al. Insecure until proven updated: analyzing AMD SEV's remote attestation
Santos et al. Towards Trusted Cloud Computing.
Vaquero et al. Locking the sky: a survey on IaaS cloud security
Aslam et al. Security and trust preserving VM migrations in public clouds
Shetty et al. A survey on techniques of secure live migration of virtual machine
US20230325492A1 (en) Secure Runtime Systems And Methods
Li et al. Droidvault: A trusted data vault for android devices
Schear et al. Bootstrapping and maintaining trust in the cloud
JP2016506107A (en) Management control method, apparatus and system for virtual machine
Takahashi et al. Enabling secure multitenancy in cloud computing: Challenges and approaches
Rocha et al. Defense-in-depth against malicious insiders in the cloud
EP3790257B1 (en) Security system for using shared computational facilities
Naruchitparames et al. Enhancing data privacy and integrity in the cloud
Hosseinzadeh et al. Recent trends in applying TPM to cloud computing
Fan et al. An improved vTPM-VM live migration protocol
Morbitzer et al. GuaranTEE: Introducing control-flow attestation for trusted execution environments
Condé et al. Using Intel SGX to protect authentication credentials in an untrusted operating system
Mofrad et al. Leveraging Intel SGX to create a nondisclosure cryptographic library
Sathya Narayana et al. Trusted model for virtual machine security in cloud computing
Yan et al. SplitDroid: isolated execution of sensitive components for mobile applications
Paladi et al. Domain-based storage protection (DBSP) in public infrastructure clouds
Althobaiti Analyzing security threats to virtual machines monitor in cloud computing environment
Choi et al. Isolated mini-domain for trusted cloud computing
Oktay et al. Circular chain VM protection in AdjointVM