Trusted computing: Security and applications
E Gallery, CJ Mitchell - Cryptologia, 2009 - Taylor & Francis
The main objective of this paper is to highlight some of the major security and application
issues confronting trusted computing technology. This technology—now present in a large …
issues confronting trusted computing technology. This technology—now present in a large …
Enhancing data privacy and integrity in the cloud
J Naruchitparames, MH Güneş - … International Conference on …, 2011 - ieeexplore.ieee.org
Cloud computing is a new computing paradigm in which dynamically scalable resources are
provided as a service over the Internet. One central concern in cloud computing is the …
provided as a service over the Internet. One central concern in cloud computing is the …
Challenges for trusted computing
S Balfe, E Gallery, CJ Mitchell… - IEEE Security & …, 2008 - ieeexplore.ieee.org
Trusted computing is proving to be one of the most controversial technologies in recent
years. Rather than become embroiled in the debate over possible (mis) appropriations of its …
years. Rather than become embroiled in the debate over possible (mis) appropriations of its …
Increasing the resilience of critical scada systems using peer-to-peer overlays
Abstract Supervisory Control and Data Acquisition (SCADA) systems are migrating from
isolated to highly-interconnected large scale architectures. In addition, these systems are …
isolated to highly-interconnected large scale architectures. In addition, these systems are …
Trusted mobile platforms
E Gallery, CJ Mitchell - International School on Foundations of Security …, 2006 - Springer
This article addresses two main topics. Firstly, we review the operation of trusted computing
technology, which now appears likely to be implemented in future mobile devices (including …
technology, which now appears likely to be implemented in future mobile devices (including …
Protection of SCADA communication channels
The modern day e-society inherently depends on Critical Infrastructures (CI) such as power
grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory …
grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory …
[PDF][PDF] Mobile agents and the deus ex machina
S Balfe, E Gallery - Advanced Information Networking and Applications …, 2007 - Citeseer
Mobile Agents and the Deus Ex Machina Page 1 Mobile Agents and the Deus Ex Machina
Shane Balfe∗and Eimear Gallery†, Royal Holloway, University of London, Egham, Surrey …
Shane Balfe∗and Eimear Gallery†, Royal Holloway, University of London, Egham, Surrey …
A property-dependent agent transfer protocol
E Gallery, A Nagarajan, V Varadharajan - … , Trust 2009, Oxford, UK, April 6 …, 2009 - Springer
This paper examines how a secure agent transfer protocol based upon TCG-defined
mechanisms can be improved using property-based platform state information. In doing so …
mechanisms can be improved using property-based platform state information. In doing so …
Blind processing: Securing data against system administrators
MH Günes, CY Evrenosoglu - 2010 IEEE/IFIP Network …, 2010 - ieeexplore.ieee.org
Multi-owner systems such as power grid need information from all parties to operate
efficiently. However, in general, information sharing is limited by market and other …
efficiently. However, in general, information sharing is limited by market and other …
Mobile agents: concepts and technologies
A Poggi, M Tomaiuolo - Handbook of Research on Mobility and …, 2011 - igi-global.com
Current technological advances and the increasing diffusion of its use for scientific, financial
and social activities, make Internet the de facto platform for providing worldwide distributed …
and social activities, make Internet the de facto platform for providing worldwide distributed …