Trusted-Computing Technologies for the Protection of Critical Information Systems

被引:0
|
作者
Lioy, Antonio [1 ]
Ramunno, Gianluca [1 ]
Vernizzi, Davide [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, I-10129 Turin, Italy
关键词
Critical infrastructure protection; trusted computing; security; assurance;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Information systems controlling critical infrastructures are vital elements of our modem society. Purely software-based protection techniques have demonstrated limits in fending off attacks and providing assurance of correct configuration. Trusted computing techniques promise to improve over this situation by using hardware-based security solutions. This paper introduces the foundations of trusted computing and discusses how it can be usefully applied to the protection of critical information systems.
引用
收藏
页码:77 / 83
页数:7
相关论文
共 50 条
  • [1] A Trusted Computing Architecture for Critical Infrastructure Protection
    Burmester, Mike
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 64 - 69
  • [2] A Critical Comparison of Trusted Computing and Trust Management Technologies
    Tomaiuolo, Michele
    [J]. INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2014, 4 (04) : 64 - 81
  • [3] Integrated Trusted Protection Technologies for Industrial Control Systems
    Wang, Jingpei
    Liu, Jie
    Yang, Shengming
    Zhang, Minghui
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 70 - 75
  • [4] Protection of Identity Information in Cloud Computing without Trusted Third Party
    Ranchal, Rohit
    Bhargava, Bharat
    Ben Othmane, Lotfi
    Lilien, Leszek
    Kim, Anya
    Kang, Myong
    Linderman, Mark
    [J]. 2010 29TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS SRDS 2010, 2010, : 368 - 372
  • [5] TRUSTED COMPUTING AND INFORMATION SECURITY
    Zhang Huanguo
    Mu Yi
    [J]. CHINA COMMUNICATIONS, 2013, 10 (11) : IX - X
  • [6] A security model to protect sensitive information flows based on trusted computing technologies
    Wang, Shi-Hua
    Li, Xiao-Yong
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3646 - +
  • [7] TRUSTED COMPUTING AND INFORMATION SECURITY
    张焕国
    MU Yi
    [J]. China Communications, 2013, 10 (11) : 11 - 12
  • [8] Computing and information technologies in transportation systems - Introduction
    Easa, Said M.
    Hoel, Lester A.
    [J]. COMPUTER-AIDED CIVIL AND INFRASTRUCTURE ENGINEERING, 2008, 23 (07) : 481 - 482
  • [9] Cloud Computing Security Challenges and Critical Technologies of Its Protection
    Yang, Yuxing
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 372 - 377
  • [10] Trusted computing for automotive systems
    Bogdanov, A.
    Eisenbarth, T.
    Wolf, M.
    Wollinger, T.
    [J]. AUTOMOTIVE SECURITY, 2007, 2016 : 227 - 237