Trusted computing for infrastructure

被引:0
|
作者
机构
来源
| 1600年 / Telefonaktiebolaget L.M. Ericsson卷 / 91期
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Networked Society is built on a complex and intricate infrastructure that brings distributed services, data processing and communication together, combining them into an innovative and more meaningful set of services for people, business and society. Trusted computing technologies will play a crucial role in meeting the security expectations of users, regulators and infrastructure owners. Users and owners of processing nodes use trusted computing to assess the certainty of one or several aspects, including what the processing nodes do and how nodes protect themselves against threats. This includes determining where data is stored and processed, which can be significant when legal or business requirements related to data handling need to be met.
引用
收藏
相关论文
共 50 条
  • [1] Integrity management infrastructure for trusted computing
    Munetoh, Seiji
    Nakamura, Megumi
    Yoshihama, Sachiko
    Kudo, Michiharu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1242 - 1251
  • [2] An Improved Grid Security Infrastructure by Trusted Computing
    YAN Fei~ 1
    2. College of Computer Science and Technology
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1805 - 1808
  • [3] A Trusted Computing Architecture for Critical Infrastructure Protection
    Burmester, Mike
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 64 - 69
  • [4] Decentralized Trusted Computing Base for Blockchain Infrastructure Security
    Hardjono, Thomas
    Smith, Ned
    FRONTIERS IN BLOCKCHAIN, 2019, 2
  • [6] DHT-based security infrastructure for trusted internet and grid computing
    Hwang, Kai
    Cai, Min
    Kwok, Yu-Kwong
    Song, Shanshan
    Chen, Yu
    Chen, Ying
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (04) : 412 - 433
  • [7] An improved wireless grid security infrastructure based on trusted computing technology
    Yan, Fei
    Zhang, Huanguo
    Shen, Zhidong
    Zhang, Liqiang
    Qiang, Weizhong
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1186 - +
  • [8] Trusted Cloud Computing Architectures for infrastructure as a service: Survey and systematic literature review
    Ibrahim, Fady A. M.
    Hemayed, Elsayed E.
    COMPUTERS & SECURITY, 2019, 82 : 196 - 226
  • [9] Secure VANETs: Trusted Communication Scheme between Vehicles and Infrastructure Based on Fog Computing
    Arif, Muhammad
    Wang, Guojun
    Balas, Valentina Emilia
    STUDIES IN INFORMATICS AND CONTROL, 2018, 27 (02): : 235 - 246
  • [10] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414