Results 31 to 40 of about 2,008,551 (307)

Trust Model Research in Cloud Computing Environment [PDF]

open access: yesAdvances in Computer Science Research, 2015
The trust evaluation research in cloud computing has been involved in the node security communication, security storage, resource allocation and many other aspects.As an effective replacement oftraditional networksecurity,trust mechanismhas effectively solved the security problems of distributed computing, such as grid computing, pervasive computing ...
Changqing Gong, Xiguang Li, Haiyang Ding
openaire   +1 more source

Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective

open access: yesIEEE Access, 2021
As machine learning (ML) technologies and applications are rapidly changing many computing domains, security issues associated with ML are also emerging.
Kha Dinh Duy   +3 more
doaj   +1 more source

Secure communication in IP-based wireless sensor network via a trusted gateway [PDF]

open access: yes, 2015
As the IP-integration of wireless sensor networks enables end-to-end interactions, solutions to appropriately secure these interactions with hosts on the Internet are necessary.
Demeester, Piet   +4 more
core   +1 more source

Trusted Launch of Virtual Machine Instances in Public IaaS Environments [PDF]

open access: yes, 2013
Cloud computing and Infrastructure-as-a-Service (IaaS) are emerging and promising technologies, however their adoption is hampered by data security concerns. At the same time, Trusted Computing (TC) is experiencing an increasing interest as a security
Aslam, Mudassar   +3 more
core   +4 more sources

MA-TEECM: Mutual Anonymous Authentication-Based Credential Migration Technology for Mobile Trusted Execution Environments

open access: yesIEEE Access, 2023
ARM TrustZone is the most widely used mobile trusted execution environment (TEE) technology today. Its hardware-enabled isolated execution environment provides reliable assurance of secure storage of credentials in mobile devices.
Ziwang Wang, Liang Wang, Huili Yan
doaj   +1 more source

Privacy-by-Design Environments for Large-Scale Health Research and Federated Learning from Data

open access: yesInternational Journal of Environmental Research and Public Health, 2022
This article offers a brief overview of ‘privacy-by-design (or data-protection-by-design) research environments’, namely Trusted Research Environments (TREs, most commonly used in the United Kingdom) and Personal Health Trains (PHTs, most commonly used ...
Peng Zhang, Maged N. Kamel Boulos
semanticscholar   +1 more source

Research on Trusted Application Environment base on PTM [PDF]

open access: yesProceedings of the 2014 International Conference on Computer, Communications and Information Technology, 2014
Trusted Computing leverages Trusted Platform Module (TPM) as the root of trust to build secure computing environment so as to improve the security of terminals. But there are some security problems of user roaming and migration of sealed data because of binding between platforms and TPMs.
Yichen Jiang, Dawei Zhang, Tianhua Liu
openaire   +1 more source

Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone

open access: yesSensors, 2021
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for the implementation of security-oriented solutions for several smart intra and inter-connected devices.
Nikolaos Koutroumpouchos   +2 more
doaj   +1 more source

Trustee: A Trust Management System for Fog-enabled Cyber Physical Systems [PDF]

open access: yes, 2019
In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which ...
Chowdhry, B. S.   +3 more
core   +1 more source

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

Home - About - Disclaimer - Privacy