Information systems controlling critical infrastructures are vital elements of our modern society. Purely software-based protection techniques have demonstrated limits in fending off attacks and providing assurance of correct configuration. Trusted computing techniques promise to improve over this situation by using hardware-based security solutions. This paper introduces the foundations of trusted computing and discusses how it can be usefully applied to the protection of critical information systems. © 2009 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Lioy, A., Ramunno, G., & Vernizzi, D. (2009). Trusted-computing technologies for the protection of critical information systems. In Advances in Soft Computing (Vol. 53, pp. 77–83). https://doi.org/10.1007/978-3-540-88181-0_10
Mendeley helps you to discover research relevant for your work.