JOURNAL ARTICLE

Security architecture of trusted virtual machine monitor for trusted computing

Qiang HuangShen Chang-xiangFang Yanxiang

Year: 2007 Journal:   Wuhan University Journal of Natural Sciences Vol: 12 (1)Pages: 13-16   Publisher: Springer Science+Business Media

Abstract

With analysis of limitations Trusted Computing Group (TCG) has encountered, we argued that virtual machine monitor (VMM) is the appropriate architecture for implementing TCG specification. Putting together the VMM architecture, TCG hardware and application-oriented “thin” virtual machine (VM), Trusted VMM-based security architecture is present in this paper with the character of reduced and distributed trusted computing base (TCB). It provides isolation and integrity guarantees based on which general security requirements can be satisfied.

Keywords:
Trusted Computing Direct Anonymous Attestation Hypervisor Trusted Network Connect Computer science Trusted computing base Trusted Platform Module Virtual machine Architecture Operating system Embedded system Enterprise information security architecture Isolation (microbiology) Cloud computing Computer security Virtualization Cloud computing security

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
12
Refs
0.09
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Data Storage Technologies
Physical Sciences →  Computer Science →  Computer Networks and Communications
Cloud Computing and Resource Management
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

Trusted virtual machine monitor-based group signature architecture

Dandan ZouHai JinJae Hyung ParkHan‐Chieh ChaoYichen Li

Journal:   IET Communications Year: 2008 Vol: 2 (10)Pages: 1311-1319
BOOK-CHAPTER

Trusted Model for Virtual Machine Security in Cloud Computing

K. Sathya NarayanaSyam Kumar Pasupuleti

Advances in intelligent systems and computing Year: 2018 Pages: 655-665
JOURNAL ARTICLE

Cloud virtual machine lifecycle security framework based on trusted computing

Xin JinQixu WangXiang LiXingshu ChenWei Wang

Journal:   Tsinghua Science & Technology Year: 2019 Vol: 24 (5)Pages: 520-534
JOURNAL ARTICLE

An efficient security architecture for trusted computing

Yin Zhixi

Year: 2009 Vol: 38 Pages: 599-601
© 2026 ScienceGate Book Chapters — All rights reserved.