Title
Trusted-Computing Technologies for the Protection of Critical Information Systems.
Abstract
Information systems controlling critical infrastructures are vital elements of our modem society. Purely software-based protection techniques have demonstrated limits in fending off attacks and providing assurance of correct configuration. Trusted computing techniques promise to improve over this situation by using hardware-based security solutions. This paper introduces the foundations of trusted computing and discusses how it can be usefully applied to the protection of critical information systems.
Year
DOI
Venue
2008
10.1007/978-3-540-88181-0_10
PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008
Keywords
Field
DocType
Critical infrastructure protection,trusted computing,security,assurance
Information system,Trusted Computing,Software engineering,Computer security,Computer science,Critical infrastructure protection,Software
Conference
Volume
Issue
ISSN
53
4
1615-3871
Citations 
PageRank 
References 
4
0.48
5
Authors
3
Name
Order
Citations
PageRank
Antonio Lioy144453.41
Gianluca Ramunno21019.03
Davide Vernizzi3534.98