DocumentCode :
1985001
Title :
Trusted Computing Based on Virtualization
Author :
Bin Jiang
Author_Institution :
Commun. Eng. Sch., Hangzhou Dianzi Univ., Hangzhou, China
fYear :
2010
fDate :
20-22 Aug. 2010
Firstpage :
1
Lastpage :
4
Abstract :
Virtualization and Trusted Computing are two important approaches in the information security field. How two combine them to form more powerful information security solutions deserves researching. This paper introduces how to virtulize the key components of trusted computing, including the Trusted Computing Platform, the Trust Platform Module (TPM) and the Trusted Chain, by using virtualization technology.
Keywords :
security of data; information security field; trust platform module; trusted chain; trusted computing platform; virtualization technology; Computer architecture; Conferences; Hardware; Information security; Virtual machine monitors; Virtual machining;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Applications, 2010 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5142-5
Electronic_ISBN :
978-1-4244-5143-2
Type :
conf
DOI :
10.1109/ITAPP.2010.5566640
Filename :
5566640
Link To Document :
بازگشت