Results 61 to 70 of about 152,709 (325)

Trusted Computing and Secure Virtualization in Cloud Computing [PDF]

open access: yes, 2012
Large-scale deployment and use of cloud computing in industry is accompanied and in the same time hampered by concerns regarding protection of data handled by cloud computing providers.
Paladi, Nicolae
core   +2 more sources

CamFlow: Managed Data-sharing for Cloud Services

open access: yes, 2015
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications.
Bacon, Jean   +3 more
core   +2 more sources

Bistable Mechanisms 3D Printing for Mechanically Programmable Vibration Control

open access: yesAdvanced Engineering Materials, EarlyView.
This work introduces a 3D‐printed bistable mechanism integrated into tuned mass dampers (TMDs) for mechanically adaptive passive vibration suppression. Through optimized geometry, the bistable design provides adaptable vibration reduction across a broad range of scenarios, achieving effective vibration mitigation without complex controls or external ...
Ali Zolfagharian   +4 more
wiley   +1 more source

Access mechanism of TMP under mobile network

open access: yesTongxin xuebao, 2010
The publication of TCG MTM standard ensured the safety of mobile terminal and its promotion results in the changes of communication on mobile terminals.An access mechanism to trusted mobile platform(mobile terminals with MTM chips,TMP) was proposed on ...
WU Zhen-qiang, ZHOU Yan-wei, QIAO Zi-rui
doaj   +2 more sources

A mobile and portable trusted computing platform

open access: yesEURASIP Journal on Wireless Communications and Networking, 2011
The mechanism of establishing trust in a computing platform is tightly coupled with the characteristics of a specific machine. This limits the portability and mobility of trust as demanded by many emerging applications that go beyond the organizational ...
Nepal Surya   +3 more
doaj  

NFDI MatWerk Ontology (MWO): A BFO‐Compliant Ontology for Research Data Management in Materials Science and Engineering

open access: yesAdvanced Engineering Materials, EarlyView.
This article presents the NFDI‐MatWerk Ontology (MWO), a Basic Formal Ontology‐based framework for interoperable research data management in materials science and engineering (MSE). Covering consortium structures, research data management resources, services, and instruments, MWO enables semantic integration, Findable, Accessible, Interoperable, and ...
Hossein Beygi Nasrabadi   +4 more
wiley   +1 more source

Label-based protection scheme of vTPM secret

open access: yesTongxin xuebao, 2018
The virtual trusted platform module (vTPM) played an important role in virtualization of trusted computing.According to security problems of existed vTPM,a protection scheme based on vTPM label was proposed.Firstly,a vTPM label was created for each ...
Xingshu CHEN, Wei WANG, Xin JIN
doaj   +2 more sources

Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]

open access: yes
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar   +3 more
core   +3 more sources

A Framework for Constructing a Secure Domain of Sensor Nodes

open access: yesSensors, 2019
Application of the Internet of Things (IoT) in some critical areas (e.g., military) is limited mainly due to the lack of robust, secure, and trusted measures needed to ensure the availability, confidentiality, and integrity of information throughout its ...
Janusz Furtak   +2 more
doaj   +1 more source

Buffer overflow attack mitigation via Trusted Platform Module (TPM) [PDF]

open access: yes, 2014
As of the date of writing of this paper, we found no effort whatsoever in the employment of Trusted Computing (TC)'s Trusted Platform Module (TPM) security features in Buffer Overflow Attack (BOA) mitigation.
Hashim, Shaiful Jahari   +3 more
core  

Home - About - Disclaimer - Privacy