Trusted Computing: Providing Security for Peer-to-Peer Networks.
Shane BalfeAmit D. LakhaniKenneth G. PatersonPublished in: Peer-to-Peer Computing (2005)
Keyphrases
- trusted computing
- peer to peer networks
- peer to peer
- computer security
- computing environments
- remote attestation
- computing platform
- hierarchical peer to peer networks
- trusted platform module
- cloud computing
- distributed environment
- virtual organization
- resource selection
- access control
- security issues
- virtual machine
- access control policies
- factor authentication
- security policies