Hardware security device facilitated trusted residential energy services.
John ZicJulian JangDongxi LiuChen WangMartin de GrootPublished in: CollaborateCom (2010)
Keyphrases
- trusted computing
- network connection
- energy consumption
- computing environments
- network access
- virtual private network
- trust relationships
- energy saving
- virtual organization
- inter domain
- computer security
- service providers
- network services
- random number generator
- data acquisition
- low cost
- network security
- security services
- cloud computing
- trusted platform module
- enterprise network
- communication protocols
- service management
- web services
- mobile commerce
- real time
- information security
- real estate
- wireless networks
- hardware and software
- computing platform
- wireless sensor networks
- set top box
- public key infrastructure
- mobile payment
- service oriented
- rfid tags
- security risks
- access control
- identity management
- ubiquitous computing
- embedded systems
- directory service
- service oriented architecture
- mobile terminals
- application level
- security protocols
- security issues
- data center
- computing systems
- intrusion detection