Virtualization and Trusted Computing are two important approaches in the information security field. How two combine them to form more powerful information security solutions deserves researching. This paper introduces how to virtulize the key components of trusted computing, including the Trusted Computing Platform, the Trust Platform Module (TPM) and the Trusted Chain, by using virtualization technology.
Shuang ZhangXinyu WanKong DeqiYangming Guo
Juan WangWutao LinHaoyu LiBianxia DuKe MengJiang Wang
Shuang ZhangYuanxun WangXinyu WanZhihui LiYangming Guo
Liqiang ZhangLu ChenHuanguo ZhangFei Yan