Towards a new framework for TPM compliance testing [PDF]
Trusted Computing Group (TCG) has proposed the Trusted Computing (TC) concept. Subsequently, TC becomes a common base for many new computing platforms, called Trusted Platform (TP) architecture (hardware and software) that, practically, has a built-in ...
Ab. Manan, Jamalul-lail+2 more
core +2 more sources
Distributed intrusion detection trust management through integrity and expertise evaluation [PDF]
Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed.
Ab. Manan, Jamalul-Lail+2 more
core +1 more source
Research on key management and authentication protocol of PDA in smart grid
According to PDA in smart grid, which faced with security issues, key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.
YU Xiao, TIAN Li, WANG Jie, LIU Zhe
doaj +3 more sources
Implementing Trusted Terminals with a and SITDRM [PDF]
The SITDRM Enterprise system [N. Sheppard, R. Safavi-Naini “Protecting Privacy with the MPEG-21 IPMP Framework”. International Workshop on Privacy Enhancing Technologies 2006, pp.
Safavi-Naini, Reihaneh+2 more
core +1 more source
Powerful authentication regime applicable to naval OFP integrated development (PARANOID): a vision for non-circumventable code signing and traceability for embedded avionics software [PDF]
Purpose – This paper aims to describe an effort to provide for a robust and secure software development paradigm intended to support DevSecOps in a naval aviation enterprise (NAE) software support activity (SSA), with said paradigm supporting strong ...
Joe Garcia+5 more
doaj +1 more source
Confidential computing and related technologies: a critical review
This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC).
Muhammad Usama Sardar, Christof Fetzer
doaj +1 more source
RESEKRA: Remote Enrollment Using SEaled Keys for Remote Attestation
This paper presents and implements a novel remote attestation method to ensure the integrity of a device applicable to decentralized infrastructures, such as those found in common edge computing scenarios.
Ernesto Gómez-Marín+5 more
doaj +1 more source
The Cryptographic Key Distribution System for IoT Systems in the MQTT Environment
The Internet of Things (IoT) is a very abundant source of data, as well as a source of many vulnerabilities. A significant challenge is preparing security solutions to protect IoT nodes’ resources and the data exchanged. The difficulty usually stems from
Janusz Furtak
doaj +1 more source
A Blockchain-Based Trusted Edge Platform in Edge Computing Environment
Edge computing is a product of the evolution of IoT and the development of cloud computing technology, providing computing, storage, network, and other infrastructure close to users.
Jinnan Zhang+7 more
doaj +1 more source
RAitc: Securely Auditing the Remotely Executed Applications
One of the most important security challenges in remote computing (e.g., cloud computing) is protecting users' applications running on the service platform from malicious attacks.
Lei Zhou, Entao Luo, Guojun Wang
doaj +1 more source