A Formally Verified Configuration for Hardware Security Modules in the Cloud.
Riccardo FocardiFlaminia L. LuccioPublished in: CCS (2021)
Keyphrases
- cloud computing
- low cost
- trusted computing
- computing platform
- cloud computing environment
- hardware and software
- network security
- network access
- real time
- security issues
- computing systems
- cloud storage
- random number generator
- security policies
- building blocks
- information security
- intrusion detection
- statistical databases
- computer security
- embedded systems
- hardware implementation
- security requirements
- security analysis
- computing infrastructure
- access control
- security threats
- protection scheme
- security problems
- security systems
- security level
- virtual machine
- data center
- computer systems
- image processing