메뉴 건너뛰기




Volumn , Issue , 2012, Pages 5-9

The analysis and design of trusted computing applied into cloud

Author keywords

(CUM); cloud computing; Configuration Dynamic Update Module; Service Authentication List Management (SAL); system survivability; trusted computing

Indexed keywords

(CUM); DYNAMIC UPDATE; SERVICE AUTHENTICATION; SYSTEM SURVIVABILITY; TRUSTED COMPUTING;

EID: 84867384322     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSGRC.2012.6287124     Document Type: Conference Paper
Times cited : (6)

References (10)
  • 1
    • 77957263904 scopus 로고    scopus 로고
    • The Security of Cloud Computing System enabled by Trusted Computing Technology
    • Wuhan University; Northeastern University
    • Zhidong Shen, Wuhan University; Qiang Tong, Northeastern University; The Security of Cloud Computing System enabled by Trusted Computing Technology; 2010 2ed International Conference on Signal Processing Systems(ICSPS).
    • 2010 2ed International Conference on Signal Processing Systems(ICSPS)
    • Shen, Z.1    Tong, Q.2
  • 2
    • 68249099143 scopus 로고    scopus 로고
    • Trusted Computing Model Based on Server-end Storage
    • Tsinghua University
    • Zhiyong Tan, Tiange Si, Duo Liu, Yiqi Dai; Tsinghua University; 〈Trusted Computing Model Based On Server-end Storage〉; Journal of Tsinghua University(Science&Technology); 2009, Volume 49, No.7.
    • (2009) Journal of Tsinghua University(Science&Technology) , vol.49 , Issue.7
    • Tan, Z.1    Si, T.2    Liu, D.3    Dai, Y.4
  • 4
    • 78149290576 scopus 로고    scopus 로고
    • Electronics Industry Publication; ISBN: 978-7-121-10199-1
    • 〈Cloud Computing〉; Peng Liu; Electronics Industry Publication; ISBN: 978-7-121-10199-1
    • Cloud Computing
    • Liu, P.1
  • 5
    • 79951999348 scopus 로고    scopus 로고
    • Study on Cloud Computing Security
    • State Key Laboratory of Information Security
    • Dengguo Feng, Min Zhang, Yan Zhang, Zhen Xu; State Key Laboratory of Information Security; 〈Study on Cloud Computing Security〉; Journal of Software, 2011.
    • (2011) Journal of Software
    • Feng, D.1    Zhang, M.2    Zhang, Y.3    Xu, Z.4
  • 6
    • 84870642654 scopus 로고    scopus 로고
    • 29 March Version 1.2, Revision 94
    • Trusted Computing Group. TPM Main Specification[S]. 29 March 2006.Version 1.2, Revision 94,http://www. trustedcomputinggroup.org.
    • (2006) TPM Main Specification[S]


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.