The protection for private keys in distributed computing system enabled by trusted computing platform

Author(s):  
Zhidong Shen ◽  
Xiaoping Wu
2014 ◽  
Vol 571-572 ◽  
pp. 400-403
Author(s):  
Yan Fei Cao ◽  
Jun Ming Pan

This paper analyzed functions of the network information system based on trusted computing and trusted computing platform based on cloud computing. Raised the propose to expand the application of trusted computing technology to network information system, to meet the needs of cloud computing of trusted computing, trusted cloud computing, implement the trusted cloud computing. In our design, will take the Trusted Computing Platform (TCP) as the basis of cloud computing system, provide some important security functions to ensure the communication and data security.Finally put forward the implement methods.


2010 ◽  
Vol 33 (7) ◽  
pp. 1165-1176 ◽  
Author(s):  
Ming-Di XU ◽  
Huan-Guo ZHANG ◽  
Heng ZHAO ◽  
Jun-Lin LI ◽  
Fei YAN

2007 ◽  
Vol 12 (1) ◽  
pp. 101-104 ◽  
Author(s):  
Liming Hao ◽  
Xun Sun ◽  
Shutang Yang ◽  
Songnian Lu

2012 ◽  
Vol 482-484 ◽  
pp. 279-286
Author(s):  
Zhi Gang Si ◽  
Ping Li ◽  
Xin Chen ◽  
Ying Wan

A trusted computing platform is designed based on XEN virtual machine, and a dynamic integrity measurement scheme is presented using hypercall mechanism. This scheme can solve the deficiency of limited scope or complicated structure comparing with other dynamic integrity measurement schemes.


Sign in / Sign up

Export Citation Format

Share Document