Trusted computing: Challenges & solutions
Most citizens of the world today are fighting for – either by battling viruses, spam, phishing or other malware, or by fending off schemes to compromise privacy and extract confidential information.With these worries in mind, the Trusted Computing Group (TCG) was established to develop specificatio...
Main Author: | Awang, Nor Fatimah |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2009
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/13540/1/PID229.pdf |
Similar Items
-
Security measurement as a trust in cloud computing service selection and monitoring
by: Ghazali, Osman, et al.
Published: (2017) -
From grids to clouds: recap on challenges and solutions
by: Dakkak, Omar, et al.
Published: (2018) -
Identity credential issuance with trusted computing
by: Abd Aziz, Norazah, et al.
Published: (2009) -
Robust multi-dimensional trust computing mechanism for cloud computing
by: Firdhous, Mohamed, et al.
Published: (2014) -
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)