Keyphrases
- trusted computing
- cryptographic protocols
- computer security
- computing environments
- remote attestation
- virtual organization
- trusted platform module
- information security
- computing platform
- security protocols
- cryptographic algorithms
- cloud computing
- lightweight
- authentication protocol
- access control
- security model
- public key cryptography
- access control policies
- information systems
- public key
- security issues