Aslam et al., 2010 - Google Patents
TCG based approach for secure management of virtualized platforms: state-of-the-artAslam et al., 2010
View PDF- Document ID
- 17186935005835456572
- Author
- Aslam M
- Gehrmann C
- Publication year
External Links
Snippet
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios. Where virtualization promises clear advantages it also poses new security challenges which …
- 238000005259 measurement 0 description 64
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4732513B2 (en) | Method and apparatus for providing a software-based security coprocessor | |
US7636442B2 (en) | Method and apparatus for migrating software-based security coprocessors | |
US7613921B2 (en) | Method and apparatus for remotely provisioning software-based security coprocessors | |
US7571312B2 (en) | Methods and apparatus for generating endorsement credentials for software-based security coprocessors | |
US8060934B2 (en) | Dynamic trust management | |
US20070300069A1 (en) | Associating a multi-context trusted platform module with distributed platforms | |
Khan et al. | Design and deployment of a trusted eucalyptus cloud | |
CN103270518A (en) | Virtual Machine Validation | |
Sadeghi | Trusted computing—special aspects and challenges | |
Brasser et al. | Trusted container extensions for container-based confidential computing | |
Sisinni | Verification of software integrity in distributed systems | |
Pontes et al. | Interoperable node integrity verification for confidential machines based on AMD SEV-SNP | |
Pedone et al. | Trusted computing technology and proposals for resolving cloud computing security problems | |
Jansen et al. | Flexible integrity protection and verification architecture for virtual machine monitors | |
Lee-Thorp | Attestation in trusted computing: Challenges and potential solutions | |
Aslam et al. | TCG based approach for secure management of virtualized platforms: state-of-the-art | |
Paladi | Trusted computing and secure virtualization in cloud computing | |
Ozga et al. | Wawel: Architecture for scalable attestation of heterogeneous virtual execution environments | |
Baldwin et al. | Providing secure services for a virtual infrastructure | |
Caradonna | Privacy-preserving Remote Attestation of pods in Kubernetes | |
Cabuk et al. | Trusted Integrity Measurement and Reporting for Virtualized Platforms: (Work-in-Progress) | |
Cooper | Towards a trusted grid architecture | |
McGiffen | Setting Up TPM Attestation | |
Pedone | and Proposals for Resolving Cloud | |
Yeluri et al. | Attestation: Proving Trustability |