Results 41 to 50 of about 135,847 (312)

Towards a new framework for TPM compliance testing [PDF]

open access: yes, 2014
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC becomes a common base for many new computing platforms, called Trusted Platform (TP) architecture (hardware and software) that, practically, has a built-in ...
Ab. Manan, Jamalul-lail   +2 more
core   +2 more sources

Distributed intrusion detection trust management through integrity and expertise evaluation [PDF]

open access: yes, 2012
Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed.
Ab. Manan, Jamalul-Lail   +2 more
core   +1 more source

Research on key management and authentication protocol of PDA in smart grid

open access: yes网络与信息安全学报, 2018
According to PDA in smart grid, which faced with security issues, key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.
YU Xiao, TIAN Li, WANG Jie, LIU Zhe
doaj   +3 more sources

Implementing Trusted Terminals with a and SITDRM [PDF]

open access: yes, 2008
The SITDRM Enterprise system [N. Sheppard, R. Safavi-Naini “Protecting Privacy with the MPEG-21 IPMP Framework”. International Workshop on Privacy Enhancing Technologies 2006, pp.
Safavi-Naini, Reihaneh   +2 more
core   +1 more source

Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]

open access: yesJournal of Defense Analytics and Logistics, 2021
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia   +5 more
doaj   +1 more source

Confidential computing and related technologies: a critical review

open access: yesCybersecurity, 2023
This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC).
Muhammad Usama Sardar, Christof Fetzer
doaj   +1 more source

RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation

open access: yesSensors, 2022
This paper presents and implements a novel remote attestation method to ensure the integrity of a device applicable to decentralized infrastructures, such as those found in common edge computing scenarios.
Ernesto Gómez-Marín   +5 more
doaj   +1 more source

The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment

open access: yesSensors, 2023
The Internet of Things (IoT) is a very abundant source of data, as well as a source of many vulnerabilities. A significant challenge is preparing security solutions to protect IoT nodes’ resources and the data exchanged. The difficulty usually stems from
Janusz Furtak
doaj   +1 more source

A Blockchain-Based Trusted Edge Platform in Edge Computing Environment

open access: yesSensors, 2021
Edge computing is a product of the evolution of IoT and the development of cloud computing technology, providing computing, storage, network, and other infrastructure close to users.
Jinnan Zhang   +7 more
doaj   +1 more source

RAitc: Securely Auditing the Remotely Executed Applications

open access: yesIEEE Access, 2020
One of the most important security challenges in remote computing (e.g., cloud computing) is protecting users' applications running on the service platform from malicious attacks.
Lei Zhou, Entao Luo, Guojun Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy