Security communication model for vehicular clouds based on trusted computing

被引:0
|
作者
Zhang, Wenbo [1 ,2 ]
Bao, Zhenshan [1 ]
Li, Jian [1 ,2 ]
Zhan, Jing [1 ,2 ]
机构
[1] [1,Zhang, Wenbo
[2] Bao, Zhenshan
[3] 1,Li, Jian
[4] 1,Zhan, Jing
来源
Zhang, Wenbo (zhangwenbo@bjut.edu.cn) | 1600年 / Huazhong University of Science and Technology卷 / 42期
关键词
12;
D O I
10.13245/j.hust.141119
中图分类号
学科分类号
摘要
引用
收藏
页码:102 / 105
相关论文
共 50 条
  • [21] Trusted Third Party for Service Management in Vehicular Clouds
    Aloqaily, Moayad
    Kantarci, Burak
    Mouftah, Hussein T.
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 928 - 933
  • [22] System security model based on trusted access control under cloud computing environment
    Wang F.
    Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [23] Protecting Terminals by Security Domain Mechanism Based on Trusted Computing
    ZHOU Zheng~1
    2. Institute of Electronic Technology
    3. Naval Institute of Computing Technology
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1437 - 1440
  • [24] Research on Gateway Security Isolation Technology based on Trusted Computing
    Mao, Jiangkun
    Xu, Yufeng
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1656 - 1659
  • [25] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
  • [26] Based on Trusted Computing Solutions for Mobile Payment Terminal Security
    Yu, Haiyong
    Li, Peng
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 570 - 574
  • [27] Design and implementation of security operating system based on trusted computing
    Nie, Xiao-Wei
    Feng, Deng-Guo
    Che, Jian-Jun
    Wang, Xin-Pu
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2776 - +
  • [28] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [29] OSLO: Improving the security of trusted computing
    Kauer, Bernhard
    USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 229 - 237
  • [30] A trusted computing model based on code authorization
    Wei, Guoheng
    Zhou, Xueguang
    Zhang, Huanguo
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +