A National Trusted Computing Strategy

نویسندگان

  • Cynthia E. Irvine
  • Timothy E. Levin
  • George W. Dinolt
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing

The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...

متن کامل

Re: Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace

1. Will the process and outcome be seen as publicly legitimate? The envisioned identity ecosystem will affect many people in many ways, but the “steering” process will have questionable legitimacy unless it is open and genuinely representative of users’ interests. More generally, we question whether any putatively representative stakeholder process can be perceived as publicly legitimate in the...

متن کامل

Identity Credential Issuance with Trusted Computing

In a client-server environment that deals with multiple clients, there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication. However, these credentials c...

متن کامل

A Threshold Signature Scheme Based on TPM

For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn’t do well in resisting internal attacks and external attacks and collusion attacks, so this paper presents a new threshold signature based on Trusted Platform Module (TPM), based on TPM the signature node first should finis...

متن کامل

Pomcor’s Response to the Notice of Inquiry On NSTIC Governance Structure

The National Strategy for Trusted Identities in Cyberspace (NSTIC) has come at the right time. There has been much experimentation over the last decade with a variety of identity solutions for cyberspace. Unfortunately, the prevailing trend today is towards solutions that reduce privacy, security, user choice, and free competition. We trust that NSTIC will be able to reverse this trend, but it ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002