• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 138
Next 10 →

vTPM: Virtualizing the trusted platform module

by Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert Doorn - In USENIX Security , 2006
"... We present the design and implementation of a system that enables trusted computing for an unlimited number of virtual machines on a single hardware platform. To this end, we virtualized the Trusted Platform Module (TPM). As a result, the TPM’s secure storage and cryptographic functions are availabl ..."
Abstract - Cited by 121 (4 self) - Add to MetaCart
We present the design and implementation of a system that enables trusted computing for an unlimited number of virtual machines on a single hardware platform. To this end, we virtualized the Trusted Platform Module (TPM). As a result, the TPM’s secure storage and cryptographic functions

cTPM: A Cloud TPM for Cross-Device Trusted Applications

by Chen Chen, Himanshu Raj, Stefan Saroiu, Alec Wolman
"... suited for cross-device scenarios in trusted mobile ap-plications because they hinder the seamless sharing of data across multiple devices. This paper presents cTPM, an extension of the TPM’s design that adds an addi-tional root key to the TPM and shares that root key with the cloud. As a result, th ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
sidestep the difficult challenge of re-verifying the se-curity properties of a new TPM design. We demonstrate cTPM’s versatility with two case studies: extending Pas-ture with additional functionality, and re-implementing TrInc without the need for extra hardware. 1

SECURITY cTPM A Cloud TPM for Cross-Device Trusted Applications

by C H E , Steve Gribble , Hank Levy
"... C urrent Trusted Platform Modules (TPMs) are ill-suited for use in mobile services because they hinder sharing data across multiple devices seamlessly, they lack access to a trusted real-time clock, and their non-volatile storage performs poorly. We present cloud TPM (cTPM), an extension of the TPM ..."
Abstract - Add to MetaCart
for cross-device functionality. Specifically, we have identified three limitations in the TPM design that hamper building cross-device trusted applications. Limitation 1: Cross-Device Data Sharing. Current TPM abstractions offer guarantees about one single computer, and TPM's hardware protection

Tropomyosin is essential in yeast, yet the TPM1 and TPM2 products perform distinct functions../. Cell Biol

by Beth Drees, Carol Brown, Bart G. Barrell, Anthony Bretscher , 1995
"... Abstract. Sequence analysis of chromosome IX of Saccharomyces cerevisiae revealed an open reading frame of 166 residues, designated TPM2, having 64.5 % sequence identity to TPM/, that encodes the major form of tropomyosin in yeast. Purification and characterization of Tpm2p revealed a protein with t ..."
Abstract - Cited by 25 (2 self) - Add to MetaCart
Abstract. Sequence analysis of chromosome IX of Saccharomyces cerevisiae revealed an open reading frame of 166 residues, designated TPM2, having 64.5 % sequence identity to TPM/, that encodes the major form of tropomyosin in yeast. Purification and characterization of Tpm2p revealed a protein

Timing-accurate TPM simulation for whatif explorations

by Vandana Gunupudi, Stephen R. Tate
"... Abstract—The addition of security-oriented hardware devices such as Trusted Platform Modules (TPMs) to computing systems, as promoted by the Trusted Computing Group, leads to many interesting possibilities. Many interesting research questions are of the form “What if the TPM could do x?”, but since ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract—The addition of security-oriented hardware devices such as Trusted Platform Modules (TPMs) to computing systems, as promoted by the Trusted Computing Group, leads to many interesting possibilities. Many interesting research questions are of the form “What if the TPM could do x?”, but since

Methodology and Theory Integrating TPM And QFD For Improving Quality

by V. R. Pramod, S. R. Devadasan, S. Muthu, V. P. Jagathyraj, G. Dhakshina Moorthy - In Maintenance Engineering Journal of Quality in Maintenance Engineering , 2006
"... Purpose – To provide maintenance engineering community with a model named “Maintenance quality function deployment ” (MQFD) for nourishing the synergy of quality function deployment (QFD) and total productive maintenance (TPM) and enhancing maintenance quality of products and equipment. Design/metho ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Purpose – To provide maintenance engineering community with a model named “Maintenance quality function deployment ” (MQFD) for nourishing the synergy of quality function deployment (QFD) and total productive maintenance (TPM) and enhancing maintenance quality of products and equipment. Design

OEE Improvement by TPM Implementation: A Case Study

by Amit Kumar Gupta, Dr. R. K. Garg
"... The manufacturing industry has gone through significant changes in the last decade. Competition has increased dramatically. Customers focus on product quality, product delivery time and cost of product. Because of these, the organization should introduce a maintenance system to improve and increase ..."
Abstract - Add to MetaCart
can be further used. The paper is organized as: Section 1 gives introduction about maintenance function. Section 2 discusses literature review regarding development of TPM. Section 3 gives details about the steps in implementation of TPM. Section 4 describes detailed TPM implementation in the case

Performance Evaluation of TPM-based Digital Wallets

by Stephen R. Tate, Roopa Vishwanathan
"... Abstract—The Trusted Platform Module (TPM) manufactured and promoted by the Trusted Computing Group (TCG) [1] is an embedded chip found on laptops and desktops and is fast becoming a standard component on most computing systems. Previous work in trusted computing-based research has suggested that we ..."
Abstract - Add to MetaCart
that we can facilitate e-commerce transactions such as digital wallets, e-cash and offline payments using TPMs. In this paper, we experimentally evaluate the performance of digital wallets that are implemented using TPM-based functionality. In particular, we study how different approaches of implementing

ANALYTICAL HIERARCHY PROCESS FOR IDENTIFICATION OF ATTRIBUTES FOR TPM IMPLEMENTATION

by Abhishek Jain, R. C. Gupta, S. C. Soni
"... Total Productivity Maintenance is one of the effective strategy designed primarily to maximize the effectiveness of equipment throughout its entire life by the participation and motivation of the entire workforce. The paper presents the Analytic Hierarchy Process (AHP) methodology for the implementa ..."
Abstract - Add to MetaCart
for the implementation of Total Productivity Maintenance (TPM) in an organization. A TPM implementation methodol-ogy has been developed for identification of weight and priorities of TPM attributes by using pare-wise comparison (PCM) method of AHP. The result of this paper is evident that TPM can bring in commendable

M.: Tcg inside?: a note on tpm specification compliance

by Ahmad-reza Sadeghi, Marcel Selhorst, Christian Wachsmann, Marcel Win - In: STC 2006: Proceedings of the first ACM workshop on Scalable trusted computing , 2006
"... The Trusted Computing Group (TCG) has addressed a new generation of computing platforms employing both supplemental hardware and software with the primary goal to improve the security and the trust-worthiness of future IT systems. The core compo-nent of the TCG proposal is the Trusted Platform Modul ..."
Abstract - Cited by 24 (1 self) - Add to MetaCart
Module (TPM) providing certain cryptographic func-tions. Many vendors currently equip their platforms with a TPM claiming to be TCG compliant. How-ever, there is no feasible way for application devel-opers and users of TPM-enabled systems to verify this compliance. In practice, manufacturers may ex
Next 10 →
Results 1 - 10 of 138
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University