Trusted computing for infrastructure

被引:0
作者
机构
来源
| 1600年 / Telefonaktiebolaget L.M. Ericsson卷 / 91期
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Networked Society is built on a complex and intricate infrastructure that brings distributed services, data processing and communication together, combining them into an innovative and more meaningful set of services for people, business and society. Trusted computing technologies will play a crucial role in meeting the security expectations of users, regulators and infrastructure owners. Users and owners of processing nodes use trusted computing to assess the certainty of one or several aspects, including what the processing nodes do and how nodes protect themselves against threats. This includes determining where data is stored and processed, which can be significant when legal or business requirements related to data handling need to be met.
引用
收藏
相关论文
共 50 条
[21]   Fast authentication public key infrastructure for mobile ad hoc networks based on trusted computing [J].
Hao, Liming ;
Li, Xiehua ;
Yang, Shutang ;
Lu, Songnian .
2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, :910-913
[22]   Using trusted computing in trusted mail transfer protocol [J].
Mohamed, Fady A. ;
Hemayed, Elsayed E. .
SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) :926-933
[23]   A Trusted Remote Attestation Model based on Trusted Computing [J].
Yu, Yue ;
Wang, Huaimin ;
Liu, Bo ;
Yin, Gang .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :1504-1509
[24]   Trusted computing, trusted third parties, and verified communications [J].
Abadi, M .
SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 :291-308
[25]   Research on trusted storage based on trusted computing platform [J].
School of Computer, Wuhan University, Wuhan 430072, China ;
不详 .
Tongxin Xuebao, 2007, SUPPL. (117-120)
[26]   Protected Computing vs. Trusted Computing [J].
Mana, Antonio ;
Munoz, Antonio .
2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, :14-+
[27]   A Comprehensive Approach to a Trusted Test Infrastructure [J].
Merandat, Marc ;
Reynaud, Vincent ;
Valea, Emanuele ;
Quevremont, Jerome ;
Valette, Nicolas ;
Maistri, Paolo ;
Leveugle, Regis ;
Flottes, Marie-Lice ;
Dupuis, Sophie ;
Rouzeyre, Bnmo ;
Di Natale, Giorgio .
2019 IEEE 4TH INTERNATIONAL VERIFICATION AND SECURITY WORKSHOP (IVSW 2019), 2019, :43-48
[28]   TRUSTED COMPUTING AND INFORMATION SECURITY [J].
Zhang Huanguo ;
Mu Yi .
CHINA COMMUNICATIONS, 2013, 10 (11) :IX-X
[29]   Trusted computing and forensic investigations [J].
Mason, S .
DIGITAL INVESTIGATION, 2005, 2 (03) :189-192
[30]   EXTENDING THE TRUSTED COMPUTING BASE [J].
DEMELLO, JT ;
WISSEMAN, WS .
AIAA COMPUTERS IN AEROSPACE VII CONFERENCE, PTS 1 AND 2: A COLLECTION OF PAPERS, 1989, :1070-1077