Trusted Computing

Known as: TC, Endorsement key, Treacherous computing 
Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Cloud computing provides people a way to share large mount of distributed resources belonging to different organizations. That is… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Security is an emerging topic in the field of mobile and embedded platforms. The Trusted Computing Group (TCG) has outlined one… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We present the design and implementation of a system that enables trusted computing for an unlimited number of virtual machines… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Remote attestation is one of the core functionalities provided by trusted computing platforms. It holds the promise of enabling a… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security… (More)
  • figure 1
Is this relevant?
2003
2003
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current… (More)
Is this relevant?