Login / Signup
Where Does Security Stand? New Vulnerabilities vs. Trusted Computing.
Shay Gueron
Jean-Pierre Seifert
Geoffrey Strongin
Derek Chiou
Resit Sendag
Joshua J. Yi
Published in:
IEEE Micro (2007)
Keyphrases
</>
trusted computing
computer security
information security
computing environments
cloud computing
remote attestation
trusted platform module
computing platform
security issues
security vulnerabilities
virtual organization
security risks
security mechanisms
database
databases
buffer overflow