Title :
Trusted Computing Based on Virtualization
Author_Institution :
Commun. Eng. Sch., Hangzhou Dianzi Univ., Hangzhou, China
Abstract :
Virtualization and Trusted Computing are two important approaches in the information security field. How two combine them to form more powerful information security solutions deserves researching. This paper introduces how to virtulize the key components of trusted computing, including the Trusted Computing Platform, the Trust Platform Module (TPM) and the Trusted Chain, by using virtualization technology.
Keywords :
security of data; information security field; trust platform module; trusted chain; trusted computing platform; virtualization technology; Computer architecture; Conferences; Hardware; Information security; Virtual machine monitors; Virtual machining;
Conference_Titel :
Internet Technology and Applications, 2010 International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5142-5
Electronic_ISBN :
978-1-4244-5143-2
DOI :
10.1109/ITAPP.2010.5566640