Security Evaluation of Scenarios Based on the TCG's TPM Specification.
Sigrid GürgensCarsten RudolphDirk ScheuermannMarion AttsRainer PlagaPublished in: ESORICS (2007)
Keyphrases
- trusted computing
- trusted platform module
- cloud computing
- computer security
- computing environments
- computing platform
- intrusion detection
- data sets
- virtual organization
- evaluation method
- evaluation model
- statistical databases
- evaluation criteria
- network security
- information security
- access control
- information retrieval