TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing (Transcript of Discussion).
Wenbo MaoPublished in: Security Protocols Workshop (2008)
Keyphrases
- cloud computing
- key management
- computing paradigm
- security protocols
- trusted computing
- wireless sensor networks
- ad hoc networks
- resource constrained
- data management
- data center
- computing resources
- secret key
- security issues
- distributed computing
- end to end
- database systems
- wireless networks
- computer systems
- digital libraries