메뉴 건너뛰기




Volumn , Issue , 2010, Pages 804-811

A cloud architecture of virtual trusted platform modules

Author keywords

[No Author keywords available]

Indexed keywords

NEEDHAM-SCHROEDER; PUBLIC-KEY PROTOCOL; STANDARD PROTOCOLS; TRUSTED PLATFORM MODULE; WEB AUTHENTICATION;

EID: 79951796752     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EUC.2010.125     Document Type: Conference Paper
Times cited : (16)

References (21)
  • 1
    • 67549101202 scopus 로고    scopus 로고
    • Analysis and design of a hardware/software trusted platform module for embedded systems
    • N. Aaraj, A. Raghunathan, and N. K. Jha. Analysis and design of a hardware/software trusted platform module for embedded systems. ACM Trans. Embed. Comput. Syst., 8(1):1-31, 2008.
    • (2008) ACM Trans. Embed. Comput. Syst. , vol.8 , Issue.1 , pp. 1-31
    • Aaraj, N.1    Raghunathan, A.2    Jha, N.K.3
  • 2
    • 70449472021 scopus 로고    scopus 로고
    • Apache Axis2. http://ws.apache.org/axis2/.
    • Apache Axis2
  • 9
    • 28144456308 scopus 로고
    • An attack on the needham-schroeder public-key authentication protocol
    • G. Lowe. An attack on the needham-schroeder public-key authentication protocol. Inf. Process. Lett., 56(3):131-133, 1995.
    • (1995) Inf. Process. Lett. , vol.56 , Issue.3 , pp. 131-133
    • Lowe, G.1
  • 14
    • 30144435491 scopus 로고    scopus 로고
    • Peer-to-peer access control architecture using trusted computing technology
    • DOI 10.1145/1063979.1064005, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
    • R. Sandhu and X. Zhang. Peer-to-peer access control architecture using trusted computing technology. In SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 147-158, 2005. (Pubitemid 43087471)
    • (2005) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 147-158
    • Sandhu, R.1    Zhang, X.2
  • 16
    • 27544477855 scopus 로고    scopus 로고
    • BIND: A fine-grained attestation service for secure distributed systems
    • Proceedings - 2005 IEEE Symposium on Security and Privacy, IEEE S and P 2005
    • E. Shi, A. Perrig, and L. V. Doorn. Bind: A fine-grained attestation service for secure distributed systems. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 154-168, 2005. (Pubitemid 41543653)
    • (2005) Proceedings - IEEE Symposium on Security and Privacy , pp. 154-168
    • Shi, E.1    Perrig, A.2    Van Doom, L.3
  • 21
    • 79951784102 scopus 로고    scopus 로고
    • Trusted Computing Group. http://www.trustedcomputinggroup.org/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.