Trusted computing: Security and applications

E Gallery, CJ Mitchell - Cryptologia, 2009 - Taylor & Francis
The main objective of this paper is to highlight some of the major security and application
issues confronting trusted computing technology. This technology—now present in a large …

Enhancing data privacy and integrity in the cloud

J Naruchitparames, MH Güneş - … International Conference on …, 2011 - ieeexplore.ieee.org
Cloud computing is a new computing paradigm in which dynamically scalable resources are
provided as a service over the Internet. One central concern in cloud computing is the …

Challenges for trusted computing

S Balfe, E Gallery, CJ Mitchell… - IEEE Security & …, 2008 - ieeexplore.ieee.org
Trusted computing is proving to be one of the most controversial technologies in recent
years. Rather than become embroiled in the debate over possible (mis) appropriations of its …

Increasing the resilience of critical scada systems using peer-to-peer overlays

D Germanus, A Khelil, N Suri - International Symposium on Architecting …, 2010 - Springer
Abstract Supervisory Control and Data Acquisition (SCADA) systems are migrating from
isolated to highly-interconnected large scale architectures. In addition, these systems are …

Trusted mobile platforms

E Gallery, CJ Mitchell - International School on Foundations of Security …, 2006 - Springer
This article addresses two main topics. Firstly, we review the operation of trusted computing
technology, which now appears likely to be implemented in future mobile devices (including …

Protection of SCADA communication channels

A Khelil, D Germanus, N Suri - Critical Infrastructure Protection …, 2012 - Springer
The modern day e-society inherently depends on Critical Infrastructures (CI) such as power
grid, communication, transportation etc. For such CIs to operate efficiently, Supervisory …

[PDF][PDF] Mobile agents and the deus ex machina

S Balfe, E Gallery - Advanced Information Networking and Applications …, 2007 - Citeseer
Mobile Agents and the Deus Ex Machina Page 1 Mobile Agents and the Deus Ex Machina
Shane Balfe∗and Eimear Gallery†, Royal Holloway, University of London, Egham, Surrey …

A property-dependent agent transfer protocol

E Gallery, A Nagarajan, V Varadharajan - … , Trust 2009, Oxford, UK, April 6 …, 2009 - Springer
This paper examines how a secure agent transfer protocol based upon TCG-defined
mechanisms can be improved using property-based platform state information. In doing so …

Blind processing: Securing data against system administrators

MH Günes, CY Evrenosoglu - 2010 IEEE/IFIP Network …, 2010 - ieeexplore.ieee.org
Multi-owner systems such as power grid need information from all parties to operate
efficiently. However, in general, information sharing is limited by market and other …

Mobile agents: concepts and technologies

A Poggi, M Tomaiuolo - Handbook of Research on Mobility and …, 2011 - igi-global.com
Current technological advances and the increasing diffusion of its use for scientific, financial
and social activities, make Internet the de facto platform for providing worldwide distributed …