2015
DOI: 10.2174/2352096508666150804214204
|View full text |Cite
|
Sign up to set email alerts
|

A Security Protocol for Trusted Access to Cloud Environment

Abstract: When user access to the cloud computing environment, existing security protocols merely authenticate the identity of user and cloud server without considering their credibility of owning platforms. Remote attestation of trusted computing is to provide security evidence of their own platform for the both sides of communication accessed. Introducing the remote attestation mechanism into security protocol can avoid terminal security vulnerability when user accessed. By constructing of trusted access authenticatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 13 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?