Results 31 to 40 of about 152,709 (325)
Trusted Platform Module-Based Privacy in the Public Cloud: Challenges and Future Perspective
Public cloud providers offer ready-to-use, easily scalable servers on demand for a variety of applications. Storing and processing private and sensitive data in the cloud brings multiple security issues and indeed these concerns currently prevent many ...
D. Jha +4 more
semanticscholar +1 more source
IEEE Access Special Section Editorial: Trusted Computing
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan +3 more
doaj +1 more source
The paper presents a method to increase trust levels of foreign and domestic-made hardware-software platforms, designed to build specialised devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities ...
Alexey Y. Borovikov +3 more
doaj +1 more source
Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar +3 more
core +4 more sources
Kernel Integrity Measurement Architecture Based on TPM 2.0 [PDF]
The problem that the current integrity measurement technology cannot support 2.0 specification of the Trusted Platform Module(TPM),it improves the Linux kernel Integrity Metric Architecture(IMA),and designs the kernel integrity metrics framework based on
WANG Yong,ZHANG Yuhan,HONG Zhi,WEN Ru,FAN Chengyang,WANG Juan
doaj +1 more source
Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutierrez +5 more
doaj +1 more source
Towards a new framework for TPM compliance testing [PDF]
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC becomes a common base for many new computing platforms, called Trusted Platform (TP) architecture (hardware and software) that, practically, has a built-in ...
Ab. Manan, Jamalul-lail +2 more
core +2 more sources
Distributed intrusion detection trust management through integrity and expertise evaluation [PDF]
Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed.
Ab. Manan, Jamalul-Lail +2 more
core +1 more source
A Trusted Computing Architecture of Embedded System Based on Improved TPM
The Trusted Platform Module (TPM) currently used by PCs is not suitable for embedded systems, it is necessary to improve existing TPM. The paper proposes a trusted computing architecture with new TPM and the cryptographic system developed by China for ...
Wang Xiaosheng +3 more
doaj +1 more source

