Aslam, Mudassar and Gehrmann, Christian (2010) TCG based approach for secure management of virtualized platforms: state-of-the-art. [SICS Report]
There is a strong trend shift in the favor of adopting virtualization to get business benefits. The provisioning of virtualized enterprise resources is one kind of many possible scenarios. Where virtualization promises clear advantages it also poses new security challenges which need to be addressed to gain stakeholders confidence in the dynamics of new environment. One important facet of these challenges is establishing 'Trust' which is a basic primitive for any viable business model. The Trusted computing group (TCG) offers technologies and mechanisms required to establish this trust in the target platforms. Moreover, TCG technologies enable protecting of sensitive data in rest and transit. This report explores the applicability of relevant TCG concepts to virtualize enterprise resources securely for provisioning, establish trust in the target platforms and securely manage these virtualized Trusted Platforms.
|Item Type:||SICS Report|
|Uncontrolled Keywords:||Security, Trusted Computing, Virtualization, Cloud Computing, Telecommunication Networks|
|Deposited By:||Vicki Carleson|
|Deposited On:||06 Aug 2010 11:26|
|Last Modified:||17 Jan 2013 11:30|
Repository Staff Only: item control page