Linking remote attestation to secure tunnel endpoints.
Kenneth A. GoldmanRonald PerezReiner SailerPublished in: STC (2006)
Keyphrases
- endpoints
- remote attestation
- virtual machine
- trusted computing
- cloud computing
- computing platform
- security protocols
- embedded systems
- trusted platform module
- distributed computing
- data center
- computing environments
- security mechanisms
- grid systems
- line segments
- computing systems
- operating system
- minimal paths
- key management
- security requirements
- computer security
- parallel computing
- development environment
- security issues
- query processing
- data processing
- data management
- low cost