Dynamic trustworthiness verification mechanism for trusted cloud execution environment

被引:0
|
作者
Liu, Chuan-Yi [1 ,3 ]
Lin, Jie [2 ,3 ]
Tang, Bo [4 ]
机构
[1] Software School, Beijing University of Posts and Telecommunications, Beijing 100876, China
[2] School of Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
[3] Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing 100876, China
[4] Department of IT Construction, Postal Savings Bank of China, Beijing 100808, China
来源
Ruan Jian Xue Bao/Journal of Software | 2014年 / 25卷 / 03期
关键词
Trusted computing;
D O I
10.13328/j.cnki.jos.004447
中图分类号
学科分类号
摘要
引用
收藏
页码:662 / 674
相关论文
共 50 条
  • [41] Dynamic List Based Data Integrity Verification in Cloud Environment
    Akshay K.C.
    Muniyal B.
    Journal of Cyber Security and Mobility, 2022, 11 (03): : 433 - 460
  • [42] Detection method of trusted blockchain link flood attack based on trusted execution environment
    Kuang, Ruixue
    Zhang, Shuhui
    Shao, Wei
    Wang, Lianhai
    Xu, Shujiang
    Wang, Qizheng
    2023 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: IOT AND SMART CITY, ITIOTSC 2023, 2023, : 155 - 159
  • [43] Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing
    Krautheim, F. John
    Phatak, Dhananjay S.
    Sherman, Alan T.
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 211 - 227
  • [44] A novel method of APK-based automated execution and traversal with a trusted execution environment
    Chang, Rui
    Jiang, Liehui
    Yin, Qing
    Liu, Wei
    Zhang, Shengqiao
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 254 - 258
  • [45] The Research of Trusted Technology under Cloud Environment
    Lou, Yinghong
    Wang, Wenlin
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 231 - 235
  • [46] A Security Protocol for Trusted Access to Cloud Environment
    Chang, Yanan
    Zhang, Zhiyong
    Wang, Jian
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2015, 8 (02) : 135 - 144
  • [47] Performance analysis of trusted security environment in cloud
    Sharma, Satyajeet
    Sharma, Bhavna
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 657 - 666
  • [48] T-YUN: Trustworthiness Verification and Audit on the Cloud Providers
    Liu, Chuanyi
    Lin, Jie
    Fang, Binxing
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2013, E96D (11): : 2344 - 2353
  • [49] HyperEnclave: An Open and Cross-platform Trusted Execution Environment
    Jia, Yuekai
    Liu, Shuang
    Wang, Wenhao
    Chen, Yu
    Zhai, Zhengde
    Yan, Shoumeng
    He, Zhengyu
    PROCEEDINGS OF THE 2022 USENIX ANNUAL TECHNICAL CONFERENCE, 2022, : 437 - 454
  • [50] DM-TEE: Trusted Execution Environment for Disaggregated Memory
    Xia, Ke
    Wei, Sheng
    PROCEEDING OF THE GREAT LAKES SYMPOSIUM ON VLSI 2024, GLSVLSI 2024, 2024, : 204 - 209