Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques.
Mudassar AslamChristian GehrmannMats BjörkmanPublished in: SIN (2013)
Keyphrases
- trusted computing
- access control
- statistical databases
- computer security
- intrusion detection
- computing platform
- malicious code detection
- security issues
- computing environments
- information security
- security requirements
- network security
- security policies
- trusted platform module
- distributed computing
- key management
- factor authentication
- low cost