Repository logo
 
Publication

Recent Trends in Applying TPM to Cloud Computing

dc.contributor.authorHosseinzadeh, Shohreh
dc.contributor.authorSequeiros, Joao B. F.
dc.contributor.authorInácio, Pedro R. M.
dc.contributor.authorLeppänen, Ville
dc.date.accessioned2020-02-12T12:16:09Z
dc.date.available2020-02-12T12:16:09Z
dc.date.issued2019-11
dc.description.abstractTrusted platform modules (TPM) have become important safe-guards against variety of software-based attacks. By providing a limited set of cryptographic services through a well-defined interface, separated from the software itself, TPM can serve as a root of trust and as a building block for higher-level security measures. This article surveys the literature for applications of TPM in the cloud-computing environment, with publication dates comprised between 2013 and 2018. It identifies the current trends and objectives of this technology in the cloud, and the type of threats that it mitigates. Toward the end, the main research gaps are pinpointed and discussed. Since integrity measurement is one of the main usages of TPM, special attention is paid to the assessment of run time phases and software layers it is applied to.pt_PT
dc.description.versioninfo:eu-repo/semantics/publishedVersionpt_PT
dc.identifier.doihttps://doi.org/10.1002/spy2.93pt_PT
dc.identifier.urihttp://hdl.handle.net/10400.6/9233
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.publisherWileypt_PT
dc.relationInstituto de Telecomunicações
dc.relationTowards a Framework for System and Attack Modelling and Mapping of Requirements and Technology for the Internet of Things
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt_PT
dc.subjectCloud computingpt_PT
dc.subjectSecuritypt_PT
dc.subjectTrusted computingpt_PT
dc.subjectTrusted platform modulespt_PT
dc.titleRecent Trends in Applying TPM to Cloud Computingpt_PT
dc.typejournal article
dspace.entity.typePublication
oaire.awardTitleInstituto de Telecomunicações
oaire.awardTitleTowards a Framework for System and Attack Modelling and Mapping of Requirements and Technology for the Internet of Things
oaire.awardURIinfo:eu-repo/grantAgreement/FCT/6817 - DCRRNI ID/UID%2FEEA%2F50008%2F2019/PT
oaire.awardURIinfo:eu-repo/grantAgreement/FCT/OE/SFRH%2FBD%2F133838%2F2017/PT
oaire.citation.endPage24pt_PT
oaire.citation.titleWiley Security and Privacy (SPY)pt_PT
oaire.fundingStream6817 - DCRRNI ID
oaire.fundingStreamOE
person.familyNameHosseinzadeh
person.familyNameInácio
person.givenNameShohreh
person.givenNamePedro
person.identifier.ciencia-idBF1D-BCA4-179F
person.identifier.orcid0000-0002-9282-3981
person.identifier.orcid0000-0001-8221-0666
person.identifier.ridI-1778-2019
person.identifier.scopus-author-id27168727400
project.funder.identifierhttp://doi.org/10.13039/501100001871
project.funder.identifierhttp://doi.org/10.13039/501100001871
project.funder.nameFundação para a Ciência e a Tecnologia
project.funder.nameFundação para a Ciência e a Tecnologia
rcaap.embargofctPor não conhecer as permissões de acesso da editora com detalhe, preferia deixar o acesso fechado por agora e revisitar o assunto adiante.pt_PT
rcaap.rightsclosedAccesspt_PT
rcaap.typearticlept_PT
relation.isAuthorOfPublication20a6db37-2dfa-4ae5-9511-c01afcc9730d
relation.isAuthorOfPublicationd1a02783-1cad-4e7f-84a7-2e29c0a51774
relation.isAuthorOfPublication.latestForDiscoveryd1a02783-1cad-4e7f-84a7-2e29c0a51774
relation.isProjectOfPublication11e7de42-6a06-4bc8-99c3-ce68de57dbda
relation.isProjectOfPublication494bf10f-a3d0-4950-a329-b0bd6093a89f
relation.isProjectOfPublication.latestForDiscovery11e7de42-6a06-4bc8-99c3-ce68de57dbda

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Recent_trends_in_applying_TPM_to_cloud_computing.pdf
Size:
1.63 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: