Publication
Recent Trends in Applying TPM to Cloud Computing
dc.contributor.author | Hosseinzadeh, Shohreh | |
dc.contributor.author | Sequeiros, Joao B. F. | |
dc.contributor.author | Inácio, Pedro R. M. | |
dc.contributor.author | Leppänen, Ville | |
dc.date.accessioned | 2020-02-12T12:16:09Z | |
dc.date.available | 2020-02-12T12:16:09Z | |
dc.date.issued | 2019-11 | |
dc.description.abstract | Trusted platform modules (TPM) have become important safe-guards against variety of software-based attacks. By providing a limited set of cryptographic services through a well-defined interface, separated from the software itself, TPM can serve as a root of trust and as a building block for higher-level security measures. This article surveys the literature for applications of TPM in the cloud-computing environment, with publication dates comprised between 2013 and 2018. It identifies the current trends and objectives of this technology in the cloud, and the type of threats that it mitigates. Toward the end, the main research gaps are pinpointed and discussed. Since integrity measurement is one of the main usages of TPM, special attention is paid to the assessment of run time phases and software layers it is applied to. | pt_PT |
dc.description.version | info:eu-repo/semantics/publishedVersion | pt_PT |
dc.identifier.doi | https://doi.org/10.1002/spy2.93 | pt_PT |
dc.identifier.uri | http://hdl.handle.net/10400.6/9233 | |
dc.language.iso | eng | pt_PT |
dc.peerreviewed | yes | pt_PT |
dc.publisher | Wiley | pt_PT |
dc.relation | Instituto de Telecomunicações | |
dc.relation | Towards a Framework for System and Attack Modelling and Mapping of Requirements and Technology for the Internet of Things | |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | pt_PT |
dc.subject | Cloud computing | pt_PT |
dc.subject | Security | pt_PT |
dc.subject | Trusted computing | pt_PT |
dc.subject | Trusted platform modules | pt_PT |
dc.title | Recent Trends in Applying TPM to Cloud Computing | pt_PT |
dc.type | journal article | |
dspace.entity.type | Publication | |
oaire.awardTitle | Instituto de Telecomunicações | |
oaire.awardTitle | Towards a Framework for System and Attack Modelling and Mapping of Requirements and Technology for the Internet of Things | |
oaire.awardURI | info:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UID%2FEEA%2F50008%2F2019/PT | |
oaire.awardURI | info:eu-repo/grantAgreement/FCT/OE/SFRH%2FBD%2F133838%2F2017/PT | |
oaire.citation.endPage | 24 | pt_PT |
oaire.citation.title | Wiley Security and Privacy (SPY) | pt_PT |
oaire.fundingStream | 6817 - DCRRNI ID | |
oaire.fundingStream | OE | |
person.familyName | Hosseinzadeh | |
person.familyName | Inácio | |
person.givenName | Shohreh | |
person.givenName | Pedro | |
person.identifier.ciencia-id | BF1D-BCA4-179F | |
person.identifier.orcid | 0000-0002-9282-3981 | |
person.identifier.orcid | 0000-0001-8221-0666 | |
person.identifier.rid | I-1778-2019 | |
person.identifier.scopus-author-id | 27168727400 | |
project.funder.identifier | http://doi.org/10.13039/501100001871 | |
project.funder.identifier | http://doi.org/10.13039/501100001871 | |
project.funder.name | Fundação para a Ciência e a Tecnologia | |
project.funder.name | Fundação para a Ciência e a Tecnologia | |
rcaap.embargofct | Por não conhecer as permissões de acesso da editora com detalhe, preferia deixar o acesso fechado por agora e revisitar o assunto adiante. | pt_PT |
rcaap.rights | closedAccess | pt_PT |
rcaap.type | article | pt_PT |
relation.isAuthorOfPublication | 20a6db37-2dfa-4ae5-9511-c01afcc9730d | |
relation.isAuthorOfPublication | d1a02783-1cad-4e7f-84a7-2e29c0a51774 | |
relation.isAuthorOfPublication.latestForDiscovery | d1a02783-1cad-4e7f-84a7-2e29c0a51774 | |
relation.isProjectOfPublication | 11e7de42-6a06-4bc8-99c3-ce68de57dbda | |
relation.isProjectOfPublication | 494bf10f-a3d0-4950-a329-b0bd6093a89f | |
relation.isProjectOfPublication.latestForDiscovery | 11e7de42-6a06-4bc8-99c3-ce68de57dbda |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Recent_trends_in_applying_TPM_to_cloud_computing.pdf
- Size:
- 1.63 MB
- Format:
- Adobe Portable Document Format
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: