Trusted-computing technologies for the protection of critical information systems

1Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Information systems controlling critical infrastructures are vital elements of our modern society. Purely software-based protection techniques have demonstrated limits in fending off attacks and providing assurance of correct configuration. Trusted computing techniques promise to improve over this situation by using hardware-based security solutions. This paper introduces the foundations of trusted computing and discusses how it can be usefully applied to the protection of critical information systems. © 2009 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Lioy, A., Ramunno, G., & Vernizzi, D. (2009). Trusted-computing technologies for the protection of critical information systems. In Advances in Soft Computing (Vol. 53, pp. 77–83). https://doi.org/10.1007/978-3-540-88181-0_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free