Trusted computing for infrastructure

被引:0
作者
Eriksson, Mikael
Pourzandi, Makan
Smeets, Ben
机构
来源
Ericsson Review (English Edition) | 2014年 / 91卷 / 02期
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Networked Society is built on a complex and intricate infrastructure that brings distributed services, data processing and communication together, combining them into an innovative and more meaningful set of services for people, business and society. Trusted computing technologies will play a crucial role in meeting the security expectations of users, regulators and infrastructure owners. Users and owners of processing nodes use trusted computing to assess the certainty of one or several aspects, including what the processing nodes do and how nodes protect themselves against threats. This includes determining where data is stored and processed, which can be significant when legal or business requirements related to data handling need to be met.
引用
收藏
页码:20 / 27
相关论文
共 50 条
[41]   Experiences in Trusted Cloud Computing [J].
Oliver, Ian ;
Holtmanns, Silke ;
Lal, Shankar .
Journal of ICT Standardization, 2018, 6 (03) :263-278
[42]   A Public Infrastructure for a Trusted Wireless World [J].
Carnley, Renee ;
Bagui, Sikha .
FUTURE INTERNET, 2022, 14 (07)
[43]   TOCTOU, traps, and trusted computing [J].
Bratus, Sergey ;
D'Cunha, Nihal ;
Sparks, Evan ;
Smith, Sean W. .
TRUSTED COMPUTING - CHALLENGES AND APPLICATIONS, PROCEEDINGS, 2008, 4968 :14-32
[44]   Development of Trusted Computing Research [J].
ZHANG Huanguo LUO Jie JIN Gang ZHU Zhiqiang YU Fajiang YAN Fei School of Computer Wuhan University Wuhan Hubei China State Key Laboratory of Software Engineering Wuhan University Wuhan Hubei China .
Wuhan University Journal of Natural Sciences, 2006, (06) :1407-1413
[45]   Trusted computing in social cloud [J].
Govindaraj, Priya ;
Natarajan, Jaisankar .
International Journal of Reasoning-based Intelligent Systems, 2018, 10 (3-4) :212-218
[46]   Special Section: Trusted computing [J].
Xiang, Yang ;
Zhou, Wanlei .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2011, 27 (05) :527-528
[47]   Researches to the Trusted Ubiquitous Computing [J].
Sun, Daoqing .
2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, :433-437
[48]   Trusted Computing: Security and Applications [J].
Gallery, Eimear ;
Mitchell, Chris J. .
CRYPTOLOGIA, 2009, 33 (03) :217-245
[49]   A Trusted Portable Computing Device [J].
Fang Ming-wei ;
Wu Jun-jun ;
Yu Peng-fei ;
Zhang Xin-fang .
INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 :1027-1033
[50]   Trusted computing for automotive systems [J].
Bogdanov, A. ;
Eisenbarth, T. ;
Wolf, M. ;
Wollinger, T. .
AUTOMOTIVE SECURITY, 2007, 2016 :227-237