Abstract | ||
---|---|---|
Information systems controlling critical infrastructures are vital elements of our modem society. Purely software-based protection techniques have demonstrated limits in fending off attacks and providing assurance of correct configuration. Trusted computing techniques promise to improve over this situation by using hardware-based security solutions. This paper introduces the foundations of trusted computing and discusses how it can be usefully applied to the protection of critical information systems. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1007/978-3-540-88181-0_10 | PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008 |
Keywords | Field | DocType |
Critical infrastructure protection,trusted computing,security,assurance | Information system,Trusted Computing,Software engineering,Computer security,Computer science,Critical infrastructure protection,Software | Conference |
Volume | Issue | ISSN |
53 | 4 | 1615-3871 |
Citations | PageRank | References |
4 | 0.48 | 5 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Antonio Lioy | 1 | 444 | 53.41 |
Gianluca Ramunno | 2 | 101 | 9.03 |
Davide Vernizzi | 3 | 53 | 4.98 |