Hardware Security Device Facilitated Trusted Energy Services.
John J. ZicMartin de GrootDongxi LiuJulian JangChen WangPublished in: Mob. Networks Appl. (2012)
Keyphrases
- trusted computing
- network connection
- computing environments
- virtual private network
- network access
- trust relationships
- virtual organization
- trusted platform module
- data acquisition
- service providers
- service management
- computer security
- network services
- enterprise network
- low cost
- security services
- inter domain
- web services
- cloud computing
- hardware and software
- random number generator
- mobile payment
- mobile commerce
- computing platform
- identity management
- set top box
- service oriented
- access control
- network security
- intrusion detection
- information security
- communication protocols
- real time
- energy consumption
- hardware implementation
- security policies
- wireless networks
- service offerings
- distributed environment
- end users
- public key infrastructure
- mobile terminals
- computer systems
- security risks
- security requirements
- rfid tags
- computing systems
- security issues
- personal information
- virtual machine
- embedded systems
- mobile services
- security protocols
- smart spaces