The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is a good way to share many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. In this paper, we analyze some security requirements in cloud computing environment. Since the security problems both in...
SOA has the characteristic of abstraction, loose coupling and interoperability, but there are some defect related to security and trust. How to specify and verify functional and non-functional requirements for service-oriented architectures had received much attention recently. This paper is to employ a hardware-based trust mechanism called Trusted Platform Module to bootstrap trust in a service-oriented...
Trusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and verify in design process of application model for trusted computing and analyze its trust in theory. In this paper the problems of security and trust...
The goal of trusted computing proposed by TCG is to enhance the security of platform by the way of integrity measurement. TPM is a tamper-resistant hardware module designed to provide robust security capabilities like remote attestation and sealed storage for the trusted platform. But TPM has its limitation. It can't be directly used in common PC current in use. A portable TPM device is proposed and...
Peer-to-peer (P2P) networks have large advantages over server-based solutions in terms of efficiency for bandwidth consumption and server workload. This is particularly relevant for the distribution of large volume content like multimedia data. This paper proposes a security architecture that provides essential security functionality for a platform enabling commercial P2P applications. One main characteristic...
The rapid development of trusted computing (TC) technology has become a milestone in the field of information security. There is an increasing application of trusted computing platform (TCP) with trusted computing supporting software (TCSS) providing support for the trusted platform module (TPM) of TCP. There is an urgent need to test TCSS according to the specification of TC to ensure its quality...
As an important new paradigm for distributed computing, the mobile agent (MA) technology has a lot of potential applications in practical fields. However, the success of MA depends on its security. The common important problem of all existing security solutions in MA system is secure key management. This paper presented the key management tree architecture provided by core hardware module of trusted...
With the rapid development of trusted computing technology, the security of computing environment for multifarious platforms has been enhanced by implementing both dedicated hardware and software. There is an increasing application of trusted computing platform with trusted computing supporting software (TCSS) providing support for the trusted platform module. Although many TCSS vendors claim that...
We present in our paper a secure, flexible and transparent security architecture for virtual disk images.Virtual disk images are often overlooked in security concepts, especially in a grid environment where disk images are considered to be secure as long as they reside within the secured borders of the data center.However, for some applications this level of assurance is not satisfactory.In our security...
We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the complete power of a hardware TPM by providing for every virtual machine (VM) the illusion that it has its own hardware TPM. For this purpose, we introduce an additional privilege level that is only used by a virtual machine monitor...
Millions of people are enjoying the convenience of transferring money and shopping with mobile e-business, but at great risk. Because of the risk, security should be considered a fundamental aspect of e-business system design. Mobile wireless e-business system inherently possesses a higher degree of risk than wired e-business applications, and it requires greater level of security and trust. Special...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.