A National Trusted Computing Strategy
نویسندگان
چکیده
منابع مشابه
Task Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing
The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...
متن کاملRe: Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace
1. Will the process and outcome be seen as publicly legitimate? The envisioned identity ecosystem will affect many people in many ways, but the “steering” process will have questionable legitimacy unless it is open and genuinely representative of users’ interests. More generally, we question whether any putatively representative stakeholder process can be perceived as publicly legitimate in the...
متن کاملIdentity Credential Issuance with Trusted Computing
In a client-server environment that deals with multiple clients, there is a need to provide a mechanism on the server to manage the issuance of the client credentials for security authorization. Credentials created using a particular own platform identities and functions as an authentication credentials to authenticate the platform itself in a network communication. However, these credentials c...
متن کاملA Threshold Signature Scheme Based on TPM
For the traditional threshold signature mechanism does not considers whether the nodes which generate part signature are trusted and the traditional signature strategy doesn’t do well in resisting internal attacks and external attacks and collusion attacks, so this paper presents a new threshold signature based on Trusted Platform Module (TPM), based on TPM the signature node first should finis...
متن کاملPomcor’s Response to the Notice of Inquiry On NSTIC Governance Structure
The National Strategy for Trusted Identities in Cyberspace (NSTIC) has come at the right time. There has been much experimentation over the last decade with a variety of identity solutions for cyberspace. Unfortunately, the prevailing trend today is towards solutions that reduce privacy, security, user choice, and free competition. We trust that NSTIC will be able to reverse this trend, but it ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002