[go: up one dir, main page]

Aslam et al., 2010 - Google Patents

TCG based approach for secure management of virtualized platforms: state-of-the-art

Aslam et al., 2010

View PDF
Document ID
17186935005835456572
Author
Aslam M
Gehrmann C
Publication year

External Links

Snippet

There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios. Where virtualization promises clear advantages it also poses new security challenges which …
Continue reading at www.diva-portal.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
JP4732513B2 (en) Method and apparatus for providing a software-based security coprocessor
US7636442B2 (en) Method and apparatus for migrating software-based security coprocessors
US7613921B2 (en) Method and apparatus for remotely provisioning software-based security coprocessors
US7571312B2 (en) Methods and apparatus for generating endorsement credentials for software-based security coprocessors
US8060934B2 (en) Dynamic trust management
US20070300069A1 (en) Associating a multi-context trusted platform module with distributed platforms
Khan et al. Design and deployment of a trusted eucalyptus cloud
CN103270518A (en) Virtual Machine Validation
Sadeghi Trusted computing—special aspects and challenges
Brasser et al. Trusted container extensions for container-based confidential computing
Sisinni Verification of software integrity in distributed systems
Pontes et al. Interoperable node integrity verification for confidential machines based on AMD SEV-SNP
Pedone et al. Trusted computing technology and proposals for resolving cloud computing security problems
Jansen et al. Flexible integrity protection and verification architecture for virtual machine monitors
Lee-Thorp Attestation in trusted computing: Challenges and potential solutions
Aslam et al. TCG based approach for secure management of virtualized platforms: state-of-the-art
Paladi Trusted computing and secure virtualization in cloud computing
Ozga et al. Wawel: Architecture for scalable attestation of heterogeneous virtual execution environments
Baldwin et al. Providing secure services for a virtual infrastructure
Caradonna Privacy-preserving Remote Attestation of pods in Kubernetes
Cabuk et al. Trusted Integrity Measurement and Reporting for Virtualized Platforms: (Work-in-Progress)
Cooper Towards a trusted grid architecture
McGiffen Setting Up TPM Attestation
Pedone and Proposals for Resolving Cloud
Yeluri et al. Attestation: Proving Trustability