Trusted Computing
DOI: 10.1007/978-3-8348-9452-6_4
|View full text |Cite
|
Sign up to set email alerts
|

TPM Virtualization: Building a General Framework

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…In this respect, current schemes for secure VM-vTPM migration protocols either increase the virtualized platform dependence on Privacy CA [4,7,8] or violate TPM usage restrictions [5]. Moreover, as far as we are aware, there is no implementation of a secure VM-vTPM migration protocol.…”
Section: Introductionmentioning
confidence: 89%
“…In this respect, current schemes for secure VM-vTPM migration protocols either increase the virtualized platform dependence on Privacy CA [4,7,8] or violate TPM usage restrictions [5]. Moreover, as far as we are aware, there is no implementation of a secure VM-vTPM migration protocol.…”
Section: Introductionmentioning
confidence: 89%
“…Data measured for different application must be stored separately. We hence use the concept of virtual TPMs (vTPMs), which allows us to assign a (unique) virtual TPM instance to each outsourced process [28]. All vTPMs are managed by a vTPM manager, which provides an interface to create and access vTPM instances; the vTPM manager is notified whenever an application instance is started.…”
Section: Integrity Of Trusted Components and Runtime-secure Storagementioning
confidence: 99%
“…Users of virtualization technology need some level of assurance about the expected behavior of a virtual machine (VM) and its ability to protect confidential information from unauthorized disclosure. The TPM specified by the Trusted Computing Group (TCG) offers security properties that can be leveraged by the users of virtualization technology to increase the protection of the system and data from cyber security threats [1]. However, the TPM was originally designed for use with a computing system in a one to one relationship.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, issues pertaining to an Enterprise IT environment, such as migration, certification and logging have to be addressed as well. To this end, the design requirements presented in [1], [4], [7] and [8] were considered and we will like to suggest the following:…”
mentioning
confidence: 99%