Nothing Special   »   [go: up one dir, main page]

Aslam et al., 2010 - Google Patents

TCG based approach for secure management of virtualized platforms: state-of-the-art

Aslam et al., 2010

View PDF
Document ID
17186935005835456572
Author
Aslam M
Gehrmann C
Publication year

External Links

Snippet

There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios. Where virtualization promises clear advantages it also poses new security challenges which …
Continue reading at www.diva-portal.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
JP4732513B2 (en) Method and apparatus for providing a software-based security coprocessor
US7636442B2 (en) Method and apparatus for migrating software-based security coprocessors
US7613921B2 (en) Method and apparatus for remotely provisioning software-based security coprocessors
US7571312B2 (en) Methods and apparatus for generating endorsement credentials for software-based security coprocessors
US8060934B2 (en) Dynamic trust management
US9264220B2 (en) Secure virtual machine provisioning
US20070094719A1 (en) Method and apparatus for migrating virtual trusted platform modules
US20070300069A1 (en) Associating a multi-context trusted platform module with distributed platforms
Khan et al. Design and deployment of a trusted eucalyptus cloud
CN103270518A (en) Virtual Machine Validation
Brasser et al. Trusted container extensions for container-based confidential computing
Sisinni Verification of software integrity in distributed systems
Jansen et al. Flexible integrity protection and verification architecture for virtual machine monitors
Huh et al. Managing application whitelists in trusted distributed systems
Pedone et al. Trusted computing technology and proposals for resolving cloud computing security problems
Lee-Thorp Attestation in trusted computing: Challenges and potential solutions
Aslam et al. TCG based approach for secure management of virtualized platforms: state-of-the-art
Paladi Trusted computing and secure virtualization in cloud computing
Pontes et al. Interoperable node integrity verification for confidential machines based on AMD SEV-SNP
Ozga et al. Wawel: Architecture for Scalable Attestation of Heterogeneous Virtual Execution Environments
Cabuk et al. Trusted Integrity Measurement and Reporting for Virtualized Platforms: (Work-in-Progress)
Cooper Towards a trusted grid architecture
McGiffen Setting Up TPM Attestation
Pedone and Proposals for Resolving Cloud
Cabuk et al. Improving policy verification capabilities of trusted platforms