Aslam et al., 2010 - Google Patents
TCG based approach for secure management of virtualized platforms: state-of-the-artAslam et al., 2010
View PDF- Document ID
- 17186935005835456572
- Author
- Aslam M
- Gehrmann C
- Publication year
External Links
Snippet
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios. Where virtualization promises clear advantages it also poses new security challenges which …
- 238000005259 measurement 0 description 64
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4732513B2 (en) | Method and apparatus for providing a software-based security coprocessor | |
US7636442B2 (en) | Method and apparatus for migrating software-based security coprocessors | |
US7613921B2 (en) | Method and apparatus for remotely provisioning software-based security coprocessors | |
US7571312B2 (en) | Methods and apparatus for generating endorsement credentials for software-based security coprocessors | |
US8060934B2 (en) | Dynamic trust management | |
US9264220B2 (en) | Secure virtual machine provisioning | |
US20070094719A1 (en) | Method and apparatus for migrating virtual trusted platform modules | |
US20070300069A1 (en) | Associating a multi-context trusted platform module with distributed platforms | |
Khan et al. | Design and deployment of a trusted eucalyptus cloud | |
CN103270518A (en) | Virtual Machine Validation | |
Brasser et al. | Trusted container extensions for container-based confidential computing | |
Sisinni | Verification of software integrity in distributed systems | |
Jansen et al. | Flexible integrity protection and verification architecture for virtual machine monitors | |
Huh et al. | Managing application whitelists in trusted distributed systems | |
Pedone et al. | Trusted computing technology and proposals for resolving cloud computing security problems | |
Lee-Thorp | Attestation in trusted computing: Challenges and potential solutions | |
Aslam et al. | TCG based approach for secure management of virtualized platforms: state-of-the-art | |
Paladi | Trusted computing and secure virtualization in cloud computing | |
Pontes et al. | Interoperable node integrity verification for confidential machines based on AMD SEV-SNP | |
Ozga et al. | Wawel: Architecture for Scalable Attestation of Heterogeneous Virtual Execution Environments | |
Cabuk et al. | Trusted Integrity Measurement and Reporting for Virtualized Platforms: (Work-in-Progress) | |
Cooper | Towards a trusted grid architecture | |
McGiffen | Setting Up TPM Attestation | |
Pedone | and Proposals for Resolving Cloud | |
Cabuk et al. | Improving policy verification capabilities of trusted platforms |