Computing - Google Patents
3rd European Trusted Infrastructure Summer School (ETISS 2008)Computing
View PDF- Document ID
- 11919276463058540176
- Author
- Computing T
External Links
Snippet
This article identifies and discusses some of the key challenges that need to be addressed if the vision of Trusted Computing is to become reality. Topics addressed include issues with setting up and maintaining the PKI required to support the full set of Trusted Computing …
- 238000000034 method 0 description 38
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5455318B2 (en) | Dynamic trust management | |
US8549313B2 (en) | Method and system for integrated securing and managing of virtual machines and virtual appliances | |
CN107003866B (en) | Secure creation of encrypted virtual machines from encrypted templates | |
Parno et al. | Bootstrapping trust in commodity computers | |
US8074262B2 (en) | Method and apparatus for migrating virtual trusted platform modules | |
KR100930218B1 (en) | Method, apparatus and processing system for providing a software-based security coprocessor | |
EP2583410B1 (en) | Single-use authentication methods for accessing encrypted data | |
US20050021968A1 (en) | Method for performing a trusted firmware/bios update | |
Löhr et al. | Enhancing grid security using trusted virtualization | |
Martin | The ten-page introduction to Trusted Computing | |
Sadeghi | Trusted computing—special aspects and challenges | |
Chen et al. | Daonity–grid security from two levels of virtualization | |
Gallery et al. | Trusted computing: Security and applications | |
US20060294355A1 (en) | Secure variable/image storage and access | |
Sisinni | Verification of software integrity in distributed systems | |
Korthaus et al. | A practical property-based bootstrap architecture | |
Peinado et al. | An overview of NGSCB | |
Pontes et al. | Interoperable node integrity verification for confidential machines based on AMD SEV-SNP | |
Zaritto | Kubernetes pods remote attestation | |
Jansen et al. | Flexible integrity protection and verification architecture for virtual machine monitors | |
Lee-Thorp | Attestation in trusted computing: Challenges and potential solutions | |
Computing | 3rd European Trusted Infrastructure Summer School (ETISS 2008) | |
Safford et al. | Trusted computing and open source | |
Bruno | Design and Implementation of Trusted Channels in the Keystone Framework | |
Eisoldt et al. | SoK: A cloudy view on trust relationships of CVMs--How Confidential Virtual Machines are falling short in Public Cloud |