Results 31 to 40 of about 152,709 (325)

ICITPM: Integrity Validation of Software in Iterative Continuous Integration Through the Use of Trusted Platform Module (TPM)

open access: goldDETIPS/DeSECSys/MPS/SPOSE@ESORICS, 2020
Antonio Muñoz   +3 more
openalex   +3 more sources

Trusted Platform Module-Based Privacy in the Public Cloud: Challenges and Future Perspective

open access: yesIT Professional, 2022
Public cloud providers offer ready-to-use, easily scalable servers on demand for a variety of applications. Storing and processing private and sensitive data in the cloud brings multiple security issues and indeed these concerns currently prevent many ...
D. Jha   +4 more
semanticscholar   +1 more source

IEEE Access Special Section Editorial: Trusted Computing

open access: yesIEEE Access, 2020
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group (TCG), and aims to enhance the overall security, privacy and trustworthiness of a variety of computing devices. The core of the trusted computing technologies of
Zheng Yan   +3 more
doaj   +1 more source

The Method for creating a trusted hardware-software platform for its application in special purpose information systems

open access: yesБезопасность информационных технологий, 2021
The paper presents a method to increase trust levels of foreign and domestic-made hardware-software platforms, designed to build specialised devices and computing facilities, which are meeting safety requirements and protected from BIOS vulnerabilities ...
Alexey Y. Borovikov   +3 more
doaj   +1 more source

Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]

open access: yes, 2013
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar   +3 more
core   +4 more sources

Kernel Integrity Measurement Architecture Based on TPM 2.0 [PDF]

open access: yesJisuanji gongcheng, 2018
The problem that the current integrity measurement technology cannot support 2.0 specification of the Trusted Platform Module(TPM),it improves the Linux kernel Integrity Metric Architecture(IMA),and designs the kernel integrity metrics framework based on
WANG Yong,ZHANG Yuhan,HONG Zhi,WEN Ru,FAN Chengyang,WANG Juan
doaj   +1 more source

Integration of Hardware Security Modules and Permissioned Blockchain in Industrial IoT Networks

open access: yesIEEE Access, 2022
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers physical protection while adding a new security layer in the system architecture.
Antonio J. Cabrera-Gutierrez   +5 more
doaj   +1 more source

Towards a new framework for TPM compliance testing [PDF]

open access: yes, 2014
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC becomes a common base for many new computing platforms, called Trusted Platform (TP) architecture (hardware and software) that, practically, has a built-in ...
Ab. Manan, Jamalul-lail   +2 more
core   +2 more sources

Distributed intrusion detection trust management through integrity and expertise evaluation [PDF]

open access: yes, 2012
Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed.
Ab. Manan, Jamalul-Lail   +2 more
core   +1 more source

A Trusted Computing Architecture of Embedded System Based on Improved TPM

open access: yesMATEC Web of Conferences, 2017
The Trusted Platform Module (TPM) currently used by PCs is not suitable for embedded systems, it is necessary to improve existing TPM. The paper proposes a trusted computing architecture with new TPM and the cryptographic system developed by China for ...
Wang Xiaosheng   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy