Zobrazeno 1 - 10
of 5 164
pro vyhledávání: '"Trusted Computing"'
Publikováno v:
EURASIP Journal on Information Security, Vol 2024, Iss 1, Pp 1-13 (2024)
Abstract We present VirtSecIO, a hypervisor-based platform for executing secure modules. VirtSecIO provides the modules with secure paths to peripheral devices, which can be shared between the modules and the operating system. Moreover, VirtSecIO is
Externí odkaz:
https://doaj.org/article/5ef8dcb22de24ab7b114a223b394c4d5
Publikováno v:
IEEE Access, Vol 12, Pp 26536-26549 (2024)
AI&IoT edge devices run complex applications and are under the threat of stealthy attacks that are not easily detected by traditional security systems. Provenance auditing is a promising technique for determining the ramification of an attack from ev
Externí odkaz:
https://doaj.org/article/7b866240dff84320935c7a8ad52bcc39
Autor:
Jan Pennekamp, Fritz Alder, Lennart Bader, Gianluca Scopelliti, Klaus Wehrle, Jan Tobias Muhlberg
Publikováno v:
IEEE Access, Vol 12, Pp 9350-9368 (2024)
Supply chains increasingly develop toward complex networks, both technically in terms of devices and connectivity, and also anthropogenic with a growing number of actors. The lack of mutual trust in such networks results in challenges that are exacer
Externí odkaz:
https://doaj.org/article/891b141d84f546cab2889bef9e044fce
Publikováno v:
International Journal of Information Security. Oct2015, Vol. 14 Issue 5, p457-469. 13p.
Autor:
Diana Gratiela Berbecaru, Silvia Sisinni, Antonio Lioy, Benoit Rat, Davide Margaria, Andrea Vesco
Publikováno v:
IEEE Access, Vol 11, Pp 50510-50527 (2023)
Time Distribution Networks (TDNs) evolve as new technologies occur to ensure more accurate, reliable, and secure timing information. These networks typically exploit several distributed time servers, organized in a master-slave architecture, that com
Externí odkaz:
https://doaj.org/article/7ed6265dde4640cc81ec8460f3255ecc
Publikováno v:
IEEE Access, Vol 11, Pp 31583-31593 (2023)
Ensuring the security and privacy of computation and data management in the cloud and edge is an ever-important requirement. There are several working solutions today for trusted computing with general purpose processors, for instance, Intel SGX and
Externí odkaz:
https://doaj.org/article/48fae86ef3ef41ca90763476d22bfbe2
Publikováno v:
IET Information Security, Vol 16, Iss 4, Pp 314-319 (2022)
Abstract A secure processor requires that no secret, undocumented instructions be executed. Unfortunately, as today's processor design and supply chain are increasingly complex, undocumented instructions that can execute some specific functions can s
Externí odkaz:
https://doaj.org/article/ae25f02d1b3746718f1bb708c0415d6a
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Toegl, Ronald1 ronald.toegl@iaik.tugraz.at, Hutter, Michael1 michael.hutter@iaik.tugraz.at
Publikováno v:
Journal of Supercomputing. Feb2011, Vol. 55 Issue 2, p207-227. 21p. 6 Diagrams, 1 Chart.