메뉴 건너뛰기




Volumn 6101 LNCS, Issue , 2010, Pages 211-227

Introducing the trusted virtual environment module: A new mechanism for rooting trust in cloud computing

Author keywords

cloud computing; security; TPM; trust; virtualization

Indexed keywords

APPLICATION PROGRAM INTERFACES; CLOUD COMPUTING; CONFIGURABLE; CRYPTOGRAPHIC ALGORITHMS; MODULAR ARCHITECTURES; NEW MECHANISMS; SECURITY CHALLENGES; SERVICE PROVIDER; TRUST RELATIONSHIP; TRUSTED PLATFORM MODULE; VIRTUAL ENVIRONMENTS; VIRTUALIZATIONS;

EID: 77954729866     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13869-0_14     Document Type: Conference Paper
Times cited : (78)

References (19)
  • 6
    • 51849091963 scopus 로고    scopus 로고
    • TPM Virtualization: Building a General Framework
    • Pohlmann, N., Reimer, H. (eds.) Vieweg+Teubner, Wiesbaden
    • Scarlata, V., Rozas, C., Wiseman, M., Grawrock, D., Vishik, C.: TPM Virtualization: Building a General Framework. In: Pohlmann, N., Reimer, H. (eds.) Trusted Computing, pp. 43-56. Vieweg+Teubner, Wiesbaden (2008)
    • (2008) Trusted Computing , pp. 43-56
    • Scarlata, V.1    Rozas, C.2    Wiseman, M.3    Grawrock, D.4    Vishik, C.5
  • 10
    • 77954705329 scopus 로고    scopus 로고
    • Intel Trusted Execution Technology, http://www.intel.com/technology/ security/
  • 12
    • 54249130839 scopus 로고    scopus 로고
    • Para-Virtualized TPM Sharing
    • Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. Springer, Heidelberg
    • England, P., Loeser, J.: Para-Virtualized TPM Sharing. In: Lipp, P., Sadeghi, A.-R., Koch, K.-M. (eds.) Trust 2008. LNCS, vol. 4968, pp. 119-132. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4968 , pp. 119-132
    • England, P.1    Loeser, J.2
  • 14
    • 56649102115 scopus 로고    scopus 로고
    • Property-Based TPM Virtualization
    • Wu, T.- C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
    • Sadeghi, A.-R., Stüble, C., Winandy, M.: Property-Based TPM Virtualization. In: Wu, T.- C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 1-16. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5222 , pp. 1-16
    • Sadeghi, A.-R.1    Stüble, C.2    Winandy, M.3
  • 15
    • 50949106225 scopus 로고    scopus 로고
    • Department of Computer Science, Swiss Federal Institute of Technology, Zurich
    • Strasser, M.: A Software-based TPM Emulator for Linux. Department of Computer Science, Swiss Federal Institute of Technology, Zurich (2004)
    • (2004) A Software-based TPM Emulator for Linux
    • Strasser, M.1
  • 16
    • 33745171465 scopus 로고    scopus 로고
    • Finding Collisions in the Full SHA-1
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 18
    • 77951753468 scopus 로고    scopus 로고
    • Recommendation for Applications Using Approved Hash Algorithms
    • NIST, Gaithersburg
    • Dang, Q.: Recommendation for Applications Using Approved Hash Algorithms. NIST Special Publication, vol. 800. NIST, Gaithersburg (2009)
    • (2009) NIST Special Publication , vol.800
    • Dang, Q.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.