[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Computing - Google Patents

3rd European Trusted Infrastructure Summer School (ETISS 2008)

Computing

View PDF
Document ID
11919276463058540176
Author
Computing T

External Links

Snippet

This article identifies and discusses some of the key challenges that need to be addressed if the vision of Trusted Computing is to become reality. Topics addressed include issues with setting up and maintaining the PKI required to support the full set of Trusted Computing …
Continue reading at www.cs.ox.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
JP5455318B2 (en) Dynamic trust management
US8549313B2 (en) Method and system for integrated securing and managing of virtual machines and virtual appliances
CN107003866B (en) Secure creation of encrypted virtual machines from encrypted templates
Parno et al. Bootstrapping trust in commodity computers
US8074262B2 (en) Method and apparatus for migrating virtual trusted platform modules
KR100930218B1 (en) Method, apparatus and processing system for providing a software-based security coprocessor
EP2583410B1 (en) Single-use authentication methods for accessing encrypted data
US20050021968A1 (en) Method for performing a trusted firmware/bios update
Löhr et al. Enhancing grid security using trusted virtualization
Martin The ten-page introduction to Trusted Computing
Sadeghi Trusted computing—special aspects and challenges
Chen et al. Daonity–grid security from two levels of virtualization
Gallery et al. Trusted computing: Security and applications
US20060294355A1 (en) Secure variable/image storage and access
Sisinni Verification of software integrity in distributed systems
Korthaus et al. A practical property-based bootstrap architecture
Peinado et al. An overview of NGSCB
Pontes et al. Interoperable node integrity verification for confidential machines based on AMD SEV-SNP
Zaritto Kubernetes pods remote attestation
Jansen et al. Flexible integrity protection and verification architecture for virtual machine monitors
Lee-Thorp Attestation in trusted computing: Challenges and potential solutions
Computing 3rd European Trusted Infrastructure Summer School (ETISS 2008)
Safford et al. Trusted computing and open source
Bruno Design and Implementation of Trusted Channels in the Keystone Framework
Eisoldt et al. SoK: A cloudy view on trust relationships of CVMs--How Confidential Virtual Machines are falling short in Public Cloud