메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

Trusted computing strengthens cloud authentication

Author keywords

[No Author keywords available]

Indexed keywords

ARTICLE; CLOUD COMPUTING; COMPUTER LANGUAGE; COMPUTER SECURITY; COMPUTER SYSTEM; CONFIDENTIALITY; ELECTRONIC COMMERCE; GOVERNMENT; IDENTITY THEFT; INFORMATION PROCESSING; INFORMATION TECHNOLOGY; MEDICAL INFORMATICS; NOMENCLATURE; PRIVACY; SIMULATION; TELECOMMUNICATION; WEB BROWSER; BIOMETRY; HUMAN; INFORMATION RETRIEVAL; INTERNET; STANDARDS; TRENDS; TRUST;

EID: 84896351749     PISSN: None     EISSN: 1537744X     Source Type: Journal    
DOI: 10.1155/2014/260187     Document Type: Article
Times cited : (21)

References (24)
  • 1
    • 84861307113 scopus 로고    scopus 로고
    • The NIST definition of cloud computing (draft)
    • Mell P., Grance T., The NIST definition of cloud computing (draft). NIST Special Publication 2011 800 145
    • (2011) NIST Special Publication , vol.800 , pp. 145
    • Mell, P.1    Grance, T.2
  • 4
    • 84857366721 scopus 로고    scopus 로고
    • Trust in the cloud
    • 2-s2.0-84857366721 10.1016/j.istr.2011.08.006
    • Abbadi I. M., Martin A., Trust in the cloud. Information Security Technical Report 2011 16 3-4 108 114 2-s2.0-84857366721 10.1016/j.istr.2011.08. 006
    • (2011) Information Security Technical Report , vol.16 , Issue.3-4 , pp. 108-114
    • Abbadi, I.M.1    Martin, A.2
  • 6
    • 84871153200 scopus 로고    scopus 로고
    • 2012
    • TCG, Trusted computing. 2012, http://www.trustedcomputinggroup.org/ trusted-computing
    • Trusted Computing
    • Tcg1
  • 7
    • 71749086537 scopus 로고    scopus 로고
    • Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
    • Yan L., Rong C., Zhao G., Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography. Cloud Computing 2009 167 177
    • (2009) Cloud Computing , pp. 167-177
    • Yan, L.1    Rong, C.2    Zhao, G.3
  • 16
    • 79960376768 scopus 로고    scopus 로고
    • Remote user authentication scheme with hardware-based attestation
    • 2-s2.0-79960376768 10.1007/978-3-642-22191-0-38
    • Mat Nor F. B., Abd Jalil K., Ab Manan J.-L., Remote user authentication scheme with hardware-based attestation. Communications in Computer and Information Science 2011 180 2 437 447 2-s2.0-79960376768 10.1007/978-3-642- 22191-0-38
    • (2011) Communications in Computer and Information Science , vol.180 , Issue.2 , pp. 437-447
    • Mat Nor, F.B.1    Abd Jalil, K.2    Ab Manan, J.-L.3
  • 24
    • 84896325147 scopus 로고    scopus 로고
    • 2010
    • Cooke P., Black Hat TPM Hack and BitLocker. 2010, http://blogs.windows. com/windows/b/windowssecurity/archive/2010/02/10/black-hat-tpm-hack-and- bitlocker.aspx
    • Black Hat TPM Hack and BitLocker
    • Cooke, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.