JOURNAL ARTICLE

Trusted Computing Based on Virtualization

Abstract

Virtualization and Trusted Computing are two important approaches in the information security field. How two combine them to form more powerful information security solutions deserves researching. This paper introduces how to virtulize the key components of trusted computing, including the Trusted Computing Platform, the Trust Platform Module (TPM) and the Trusted Chain, by using virtualization technology.

Keywords:
Trusted Computing Virtualization Direct Anonymous Attestation Computer science Trusted Network Connect Trusted Platform Module Trusted computing base Computer security Field (mathematics) Key (lock) Operating system Cloud computing Cloud computing security

Metrics

3
Cited By
1.20
FWCI (Field Weighted Citation Impact)
4
Refs
0.83
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Distributed systems and fault tolerance
Physical Sciences →  Computer Science →  Computer Networks and Communications

Related Documents

JOURNAL ARTICLE

A trusted mobile payment environment based on trusted computing and virtualization technology

Juan WangWutao LinHaoyu LiBianxia DuKe MengJiang Wang

Journal:   Wuhan University Journal of Natural Sciences Year: 2014 Vol: 19 (5)Pages: 379-384
JOURNAL ARTICLE

Trusted Storage Virtualization in Cloud Computing

Chengming LiKoji Okamura

Journal:   Proceedings of the Asia-Pacific Advanced Network Year: 2014 Vol: 38 (0)Pages: 123-123
JOURNAL ARTICLE

Virtualization Airborne Trusted General Computing Technology

Shuang ZhangYuanxun WangXinyu WanZhihui LiYangming Guo

Journal:   Applied Sciences Year: 2023 Vol: 13 (3)Pages: 1342-1342
© 2026 ScienceGate Book Chapters — All rights reserved.