Trends and Directions in Trusted Computing: Models, Architectures and Technologies

@inproceedings{Amin2008TrendsAD,
  title={Trends and Directions in Trusted Computing: Models, Architectures and Technologies},
  author={Muhammad Amin and Shabaz Khan and Tamleek Ali and Saleem Gul},
  year={2008}
}
Until recently, all the security measures have addressed servers or networks while clients or network endpoints have missed the required security concerns relatively. Most of the mechanisms safeguarding endpoints (clients) are software based. Making endpoints survive in open and reasonably exposed environments-like internet-demand that client security should stand by a tried and true dependence and merely software based mechanisms are inadequate in providing the desired security level. Trusted… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-5 OF 5 CITATIONS

Enhancement in Wireless Sensor Networks

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Security Challenges in WSN

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Secure boot process for wireless sensor node

  • 2010 International Conference on Computer Applications and Industrial Electronics
  • 2010
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 37 REFERENCES

AMDs Vision for Trustworthy Computing

G. Strongin
  • Available at: conference.digitalidworld.com/2004/attendees/slides/1027 1700 E1.pdf, October, 2004.
  • 2004
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Magic Boxes and Boots: Security in Hardware

  • IEEE Computer
  • 2004
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Trusted Platform Module (TPM) based Security on Notebook PCs-White Paper

S. Bajikar
  • White Paper, Mobile Platforms Group– Intel Corporation, vol. 20, 2002.
  • 2002
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

SAM: a flexible and secure auction architecture using trusted hardware

  • Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001
  • 2001
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

ABYSS: An Architecture for Software Protection

  • IEEE Trans. Software Eng.
  • 1990
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Minimal TCB Code Execution

  • 2007 IEEE Symposium on Security and Privacy (SP '07)
  • 2007
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL