The protection for private keys in distributed computing system enabled by trusted computing platform

作者: Zhidong Shen , Xiaoping Wu

DOI: 10.1109/ICCDA.2010.5541169

关键词:

摘要: … for key and credentials in distributed computing environment. The function and usage of seven keys … protection for key and credential will improve the security of distributed computing …

参考文章(3)
Chung Kei Wong, M. Gouda, S.S. Lam, Secure group communications using key graphs IEEE ACM Transactions on Networking. ,vol. 8, pp. 16- 30 ,(2000) , 10.1109/90.836475
A. Avizienis, J.-C. Laprie, B. Randell, C. Landwehr, Basic concepts and taxonomy of dependable and secure computing IEEE Transactions on Dependable and Secure Computing. ,vol. 1, pp. 11- 33 ,(2004) , 10.1109/TDSC.2004.2
Jason Reid, JM Gonzalez Nieto, Edward Dawson, Eiji Okamoto, Privacy and trusted computing database and expert systems applications. pp. 383- 388 ,(2003) , 10.1109/DEXA.2003.1232052