A Formally Verified Configuration for Hardware Security Modules in the Cloud.
Riccardo FocardiFlaminia L. LuccioPublished in: CoRR (2021)
Keyphrases
- cloud computing
- random number generator
- low cost
- hardware and software
- security issues
- cloud storage
- security policies
- network access
- cloud computing environment
- information security
- real time
- computing platform
- trusted computing
- network security
- security systems
- security requirements
- access control
- statistical databases
- personal computer
- functional modules
- hardware architecture
- security properties
- data acquisition
- intrusion detection
- building blocks
- computing infrastructure
- image processing
- encryption algorithms
- windows xp
- protection scheme
- security patterns
- security threats
- security problems
- application level
- security analysis
- security mechanisms