Trusted computing for infrastructure

被引:0
作者
Eriksson, Mikael
Pourzandi, Makan
Smeets, Ben
机构
来源
Ericsson Review (English Edition) | 2014年 / 91卷 / 02期
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Networked Society is built on a complex and intricate infrastructure that brings distributed services, data processing and communication together, combining them into an innovative and more meaningful set of services for people, business and society. Trusted computing technologies will play a crucial role in meeting the security expectations of users, regulators and infrastructure owners. Users and owners of processing nodes use trusted computing to assess the certainty of one or several aspects, including what the processing nodes do and how nodes protect themselves against threats. This includes determining where data is stored and processed, which can be significant when legal or business requirements related to data handling need to be met.
引用
收藏
页码:20 / 27
相关论文
共 50 条
[31]   Mobile Security and Trusted Computing [J].
Mitchell, Chris .
IT-INFORMATION TECHNOLOGY, 2006, 48 (06) :321-326
[32]   EXTENDING THE TRUSTED COMPUTING BASE [J].
DEMELLO, JT ;
WISSEMAN, WS .
AIAA COMPUTERS IN AEROSPACE VII CONFERENCE, PTS 1 AND 2: A COLLECTION OF PAPERS, 1989, :1070-1077
[33]   Experiences in Trusted Cloud Computing [J].
Oliver, Ian ;
Holtmanns, Silke ;
Miche, Yoan ;
Lal, Shankar ;
Hippelainen, Leo ;
Kalliola, Aapo ;
Ravidas, Sowmya .
NETWORK AND SYSTEM SECURITY, 2017, 10394 :19-30
[34]   Trusted Computing: An Elusive Goal [J].
Michael, James Bret .
COMPUTER, 2015, 48 (03) :99-101
[35]   Trusted Computing: Challenges & Solutions [J].
Awang, Nor Fatimah Bt .
COMPUTING & INFORMATICS, 2009, :434-438
[36]   Trusted Logging for Grid Computing [J].
Huh, Jun Ho ;
Martin, Andrew .
APTC 2008: THIRD ASIA-PACIFIC TRUSTED INFRASTRUCTURE TECHNOLOGIES CONFERENCE, PROCEEDINGS, 2008, :30-42
[37]   The trusted computing exemplar project [J].
Irvine, CE ;
Levin, TE ;
Nguyen, TD ;
Dinolt, GW .
PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, :109-115
[38]   How trustworthy is trusted computing? [J].
Vaughan-Nichols, SJ .
COMPUTER, 2003, 36 (03) :18-20
[39]   High Time for Trusted Computing [J].
Potter, Bruce .
IEEE SECURITY & PRIVACY, 2009, 7 (06) :54-56
[40]   TRUSTED COMPUTING AND INFORMATION SECURITY [J].
张焕国 ;
MU Yi .
中国通信, 2013, 10 (11) :11-12