Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels.
Hans LöhrAhmad-Reza SadeghiChristian StübleMarion WeberMarcel WinandyPublished in: TRUST (2009)
Keyphrases
- trusted computing
- high assurance
- computing environments
- information security
- computer security
- access control
- cloud computing
- software systems
- virtual organization
- trusted platform module
- security requirements
- fault tolerant
- computing platform
- operating system
- distributed systems
- artificial intelligence
- critical infrastructure
- intrusion detection
- wireless sensor networks