A Security-Enhanced vTPM 2.0 for Cloud Computing
暂无分享,去创建一个
Feng Xiao | Wei Hu | Jianwei Huang | Huanguo Zhang | Juan Wang | Daochen Zha | Chengyang Fan | Wei Hu | D. Zha | Huanguo Zhang | Feng Xiao | Juan Wang | Jianwei Huang | Chengyang Fan
[1] Sanjit A. Seshia,et al. Moat: Verifying Confidentiality of Enclave Programs , 2015, CCS.
[2] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[3] Kenneth A. Goldman,et al. A Practical Guide to TPM 2.0 , 2015, Apress.
[4] Scott A. Rotondo. Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.
[5] Stefan Berger,et al. vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.
[6] Dhananjay S. Phatak,et al. Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing , 2010, TRUST.
[7] Ahmad-Reza Sadeghi,et al. Property-Based TPM Virtualization , 2008, ISC.
[8] Ghassan O. Karame,et al. Enabling secure VM-vTPM migration in private clouds , 2011, ACSAC '11.
[9] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[10] Dengguo Feng,et al. Formal analysis of TPM2.0 key management APIs , 2014 .
[11] Paul England,et al. Para-Virtualized TPM Sharing , 2008, TRUST.
[12] Juan del Cuvillo,et al. Using innovative instructions to create trustworthy software solutions , 2013, HASP '13.
[13] Thomas Moyer,et al. Trustworthy Whole-System Provenance for the Linux Kernel , 2015, USENIX Security Symposium.
[14] Krishna P. Gummadi,et al. Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services , 2012, USENIX Security Symposium.
[15] Claire Vishik,et al. TPM Virtualization: Building a General Framework , 2008 .
[16] Alec Wolman,et al. cTPM: A Cloud TPM for Cross-Device Trusted Applications , 2014, NSDI.