Qiang HuangShen Chang-xiangFang Yanxiang
With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented “thin” virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.
Dandan ZouHai JinJae Hyung ParkHan‐Chieh ChaoYichen Li
K. Sathya NarayanaSyam Kumar Pasupuleti
Xin JinQixu WangXiang LiXingshu ChenWei Wang