Sharing model for trusted computing platform

被引:0
|
作者
Zhang, Qin [1 ]
Chen, Chunrun [1 ]
Qiang, Weizhong [1 ]
Liu, Yingshu [1 ]
机构
[1] College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:5 / 8
相关论文
共 50 条
  • [31] Research and application of trusted computing platform based on portable TPM
    Fang, Weiwei
    Zhou, Changsheng
    Zhang, Ying
    Zhang, Liang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 506 - 509
  • [32] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [33] Secure Blockchain Platform for Industrial IoT with Trusted Computing Hardware
    Yang Q.
    Wang H.
    Wu X.
    Wang T.
    Zhang S.
    Liu N.
    IEEE Internet of Things Magazine, 2021, 4 (04): : 86 - 92
  • [34] Securing intelligent adjuncts using Trusted Computing Platform technology
    Balacheff, O
    Chan, D
    Chen, LQ
    Pearson, S
    Proudler, G
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS, 2000, 52 : 177 - 195
  • [35] WEB SERVICE SYSTEM STRUCTURE BASED ON TRUSTED COMPUTING PLATFORM
    Xu, Feng
    Ma, Hongxu
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2013, 19 (02): : 175 - 184
  • [36] A document protection solution in mobile platform based on trusted computing
    Yu, Xiaojun
    Wen, Qiaoyan
    Yan, Tao
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 251 - 255
  • [37] The research of Trusted Computing based on the model of trusted Meta data of BSCM
    Zhong, Liu
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
  • [38] A Gamification Model for Resource Sharing in Malaysian Schools Using Cloud Computing Platform
    Rahman, M. Nordin A.
    Saidu, Abdullahi Nababa
    Kadir, M. Fadzil A.
    Shamsudin, Syadiah Nor
    Saany, Syarilla Iryani A.
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA 2016), 2017, 557 : 406 - 416
  • [39] Model of Trusted Cooperative Service for Edge Computing
    Yue G.
    Dai Y.
    Yang X.
    Liu J.
    You Z.
    Zhu Y.
    1600, Science Press (57): : 1080 - 1102
  • [40] Formal Compatibility Model for Trusted Computing Applications
    ZHU Lu1
    2. Institute of Electronic Technology
    3. Trusted Computing Laboratory
    WuhanUniversityJournalofNaturalSciences, 2009, 14 (05) : 388 - 392