TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing.
Haibo ChenJun LiWenbo MaoPublished in: Security Protocols Workshop (2008)
Keyphrases
- cloud computing
- key management
- security protocols
- computing paradigm
- trusted computing
- wireless sensor networks
- ad hoc networks
- computing resources
- resource constrained
- data center
- distributed computing
- data management
- security issues
- security mechanisms
- database
- secret key
- quality of service
- multimedia services
- real time
- network resources
- response time