Security communication model for vehicular clouds based on trusted computing

被引:0
|
作者
Zhang, Wenbo [1 ,2 ]
Bao, Zhenshan [1 ]
Li, Jian [1 ,2 ]
Zhan, Jing [1 ,2 ]
机构
[1] [1,Zhang, Wenbo
[2] Bao, Zhenshan
[3] 1,Li, Jian
[4] 1,Zhan, Jing
来源
Zhang, Wenbo (zhangwenbo@bjut.edu.cn) | 1600年 / Huazhong University of Science and Technology卷 / 42期
关键词
12;
D O I
10.13245/j.hust.141119
中图分类号
学科分类号
摘要
引用
收藏
页码:102 / 105
相关论文
共 50 条
  • [31] The research of Trusted Computing based on the model of trusted Meta data of BSCM
    Zhong, Liu
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
  • [32] A Survey and Research Model for Vehicular Communication and Security Challenges
    Badea, Radu Alexandru
    Stanciu, Lucian
    2018 12TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2018, : 291 - 296
  • [33] Improved Biba model based on trusted computing
    Liu, Gang
    Zhang, Jing
    Liu, Jinhui
    Zhang, Yuan
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2793 - 2797
  • [34] A Secure Trust Model Based on Trusted Computing
    Yin Zhixi
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
  • [35] A LDAP SYNCHRONIZATION MODEL BASED ON TRUSTED COMPUTING
    Guo, Yu
    Shen, Chang-Xiang
    Han, Zhen
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2771 - 2774
  • [36] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 13 - 16
  • [37] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
  • [38] A comparison of the trusted computing group security model with Clark-Wilson
    Smith, NM
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 395 - 401
  • [39] Edge based authentication protocol for vehicular communications without trusted party communication
    Dharminder, Dharminder
    Kumar, Uddeshaya
    Gupta, Pratik
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 119 (119)
  • [40] White List Security Management Mechanism based on Trusted Computing Technology
    Zhao, Baohua
    Zhang, Hao
    Guo, Hao
    Qi, Yue
    PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1369 - 1377