Results 261 to 270 of about 135,847 (312)
Some of the next articles are maybe not open access.
SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing
IEEE Transactions on Cloud Computing, 2023Virtual Trusted Platform Modules (vTPMs) are widely used in commercial cloud platforms (e.g., VMware Cloud, Google Cloud, and Microsoft Azure) to provide virtual root-of-trust and security services for virtual machines.
Juan Wang+8 more
semanticscholar +1 more source
Data protection utilizing trusted platform module
Proceedings of the 9th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing - CompSysTech '08, 2008Data protection has become a major requirement for computer systems which process sensitive information especially in daily commercial activities. It is mainly achieved through encryption based on software protections measures that have constantly shown lacks of security against attacks or malicious codes.
Elior Vila, Plamenka Borovska
openaire +2 more sources
A Cloud Architecture of Virtual Trusted Platform Modules
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 2010We propose and implement a cloud architecture of virtual TPMs. In this architecture, TPM instances can be obtained from the TPM cloud on demand. Hence, the TPM functionality is available for applications that do not have TPM chips in their local platforms.
John Zic+4 more
openaire +2 more sources
Feasibility study of dynamic Trusted Platform Module
2010 IEEE International Conference on Computer Design, 2010A Trusted Platform Module (TPM) authenticates general purpose computing platforms. This is done by taking platform integrity measurement and comparing it with a precomputed value at boot-time. Existing TPM architectures do not support run-time integrity checking of a program on the platform.
Ramesh Karri+2 more
openaire +2 more sources
Utilizing Trusted Platform Module to Mitigate Botnet Attacks
International Journal of Advancements in Computing Technology, 2010Ever since, internet banking came into existence it has been a bull's eye for the hackers. Up to date, several cases have been reported by internet banking users for missing money or misuse of their accounts unknowingly. Well designed malwares are written to attack internet banking websites and its customers.
Muththolib Sidheeq -+3 more
openaire +3 more sources
Secur. Commun. Networks, 2016
Trusted Platform Module TPM is the "root of trust" of the whole trusted computing platform. The TPM's own security assurance is very important. This paper describes the TPM 2.0 hash-based message authentication code HMAC authorization scheme as a ...
Fajiang Yu+6 more
semanticscholar +1 more source
Trusted Platform Module TPM is the "root of trust" of the whole trusted computing platform. The TPM's own security assurance is very important. This paper describes the TPM 2.0 hash-based message authentication code HMAC authorization scheme as a ...
Fajiang Yu+6 more
semanticscholar +1 more source
A Software-Based Trusted Platform Module Emulator
2008When developing and researching new trusted computing technologies, appropriate tools to investigate their behavior and to evaluate their performance are of paramount importance. In this paper, we present an efficient and portable TPM emulator for Unix.
Heiko Stamer, Mario Strasser
openaire +2 more sources
An Integrity Protection Model for the Keys of Trusted Platform Module
2009 International Conference on Computational Intelligence and Software Engineering, 2009The trusted computing group (TCG) has set down and issued Trusted Platform Module (TPM) specification, and the security of the trusted computing system relies on the security of TPM. In this paper, the relationship between the keys inside TPM and TPM users has been established by analyzing the access control mechanism of TPM.
Shiwei Xu, Huanguo Zhang
openaire +2 more sources
Using trusted platform module to mitigate SSL stripping
2013 IEEE Conference on Open Systems (ICOS), 2013Electronic commerce refers to trading of services or products over electronic systems such as the Internet and other computer networks. Internet banking, electronic data interchange, and inventory management systems are some examples of popular electronic commerce applications.
Fazli Bin Mat Nor+3 more
openaire +2 more sources
Trusted Platform Module as an Enabler for Security in Cloud Computing
2011 Conference on Network and Information Systems Security, 2011This paper studies the possibility of using TCG (Trusted Computing Group) specifications to establish trust in Cloud Computing, especially between the provider of Cloud Computing infrastructures and his customers. The first part describes the context and the motivations that led to TCG specifications.
Mohammed Achemlal+2 more
openaire +2 more sources