The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the National classified protection of information system security requirements, the cloud computing systems classified above rank 3 is important information system, playing vital roles from the point of view of National Security. This paper develops a conceptual framework with which to address the protection of integrality protection named 'Dual Systems Architecture' to protect computing...
We introduce a model for secure managing virtual infrastructure in IaaS Cloud which called Trusted Private Virtual Data center (TVPDc). It can offer centralized management of the computing and storage resources distributed in different locations and physical machines within an IaaS cloud. Additionally, we propose a hierarchical management framework and a TVPDc establishment and deployment protocol...
Cloud computing enables organizations to realize the commercial benefits while facing the new security issues. In this paper, we presents a security model for called the Trusted Private Virtual Data center (TVPDc) that offering centralized security management of the computing and storage resources distributed in different locations and physical machines within an IaaS cloud. The TVPDc model can satisfy...
Trusted transaction is becoming more and more important as malicious user or agent inside the network may compromise the upcoming transaction. Trusted Computing mutual remote attestation mechanism is a relative new approach to overcome this problem. But limited computation capability of TPM device on the sever side is an obvious bottleneck of scalable performance. by introducing a novel high efficient...
With a prevalence of pervasive computing, especially cloud computing, the software is at the core and play a vital role. This advance the security problem, so software trust is drawing increasing attention. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the continuum...
The application of network computing technology, more and more widely, its security is particularly important to the emergence of trusted computing research for the security of network computing application technology research has provided new opportunities. In this paper, the credibility of Web-based computing environment, the structure of thought and its implementation model.
Security is one of main challenges that obstruct the wide adoption of mobile P2P systems. Current decentralized trust-management research focuses mainly on providing software resource level security schemes by trust models and algorithms, whereas potential merits of hardware-based security mechanisms to further secure application exposure have not been considered so far. This paper presents a new...
The main difference between cloud computing and traditional enterprise internal IT services is that the owner and the user of cloud IT infrastructures are separated in cloud. This change requires a security duty separation in cloud computing. Cloud service providers (CSP) should secure the services they offer and cannot exceed the customers' authorities. Currently, no traditional information security...
In this paper, we propose a formal model of trust chain from the view of measurement structure and remote attestation. Trust chain is an important technology in Trusted Computing and has received considerable attention. However, related researches on trust chain have some deficiencies such as the coarse granularity, single measurement function and ignorance of influence from run-environment when report...
A secure and trusted distribution of digital contents is a fundamental requirement for Digital Rights Management (DRM) system, so that the integrity of user terminal platform should be verified prior to contents' distribution in order to assure that the platform is free from a malicious modification and attack. Recent years the emerging trusted computing has better enhanced the necessary functionality,...
The security models used in Grid systems today strongly bear the marks of their diverse origin. Historically retrofitted to the distributed systems they are designed to protect and control, the security model is usually limited in scope and applicability, and its implementation tailored towards a few specific deployment scenarios. A common approach towards even the "basic" elements such...
This paper presents the design and implementation of an integrity measurement system based on Windows trusted computing platform. The trust chain is established from the BIOS up to the application layer, where the executable codes are taken the load-time measurements before execution. And the measurement system can generate an integrity proof for TPM-based remote attestation. In order to accurately...
The capabilities trusted computing provides have the potential to radically improve the security and robustness of present systems. By combining present models for trusted computing with the thought of code authorization, we put forward a code authorization based Operation System model for Trusted Computing. This model solves the foundation security problems in the primitive model by creating a trusted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.