The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, we analyze some security requirements in cloud computing environment. Since the security problems both in...
Trusted computing and chain of trust are the very mechanisms to solve the security problems of information system. A chain of trust is established by validating each component of hardware and software from the bottom up. There is an urgent need to test the chain of trust according to the specification of TC to ensure its security. This paper presents a test method on chain of trust by model checking...
With the increasing requirement of resource sharing, security has become a crucial item of application system. In order to improve the secure assurance of resource sharing, many researches have been carried out. Aiming at the efficiency and extreme ideal assumption problems of multi-party secure computation, this paper proposed a secure computation mechanism based on trusted computing platform. And...
Trusted computing is a new generation technology of secure computing environment proposed by trusted computing group (TCG). Although many TC vendors claim that their products are compliant to TCG specifications, itpsilas very difficult to affirm it. Moreover, according to some government regulations on security, TC products shall require the official approval. Thus the testing and evaluation on TC...
Given two machines A and B, A has to commit job codes to be executed on B and get the results back. How can A believe that the job codes are executed correctly on B and related privacy information is not revealed? We propose the attack model and the security goals during the remote execution process. To address this research problem, we propose a new method based on Trusted Computing and Virtualization...
Building a trust and reputation mechanism in P2P system is very important. This paper presented a trust model of choosing trusted source peers in P2P system based on the fuzzy relation theory in fuzzy mathematics. The authors defined four types of fuzzy trust relations, and gave the ways of fuzzy global trust relation matrix computing, which used as the base of judging which source peers were trusted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.