Trusted computing: Challenges & solutions
Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group (TCG) was established to develop specificatio...
Saved in:
Main Author: | Awang, Nor Fatimah |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/13540/1/PID229.pdf http://repo.uum.edu.my/13540/ http://www.icoci.cms.net.my |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
A memoryless trust computing mechanism for cloud computing
by: Firdhous, Mohamed, et al.
Published: (2012) -
Application of trusted computing in internet voting
by: Mohd. Zulkifli, Mohd. Zaid Waqiyuddin
Published: (2009) -
Identity credential issuance with trusted computing
by: Abd Aziz, Norazah, et al.
Published: (2009) -
Trusted computing strengthens cloud authentication
by: Ghazizadeh, Eghbal, et al.
Published: (2014) -
From grids to clouds: recap on challenges and solutions
by: Dakkak, Omar, et al.
Published: (2018)