Essays about: "Trusted Computing Group"
Showing result 1 - 5 of 6 essays containing the words Trusted Computing Group.
-
1. Secure Domain Transition of Calvin Actors
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Calvin, an Ericsson application framework for Internet of Things (IoT), simplifies the development and deployment of applications for IoT systems where many heterogeneous devices are deployed and connected through the Internet. The application engineer just needs to design and codify the application applying Calvin syntax. READ MORE
-
2. Emulation of TPM on Raspberry Pi
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The Trusted Platform Module (TPM) is a dedicated microprocessor designed to secure hardware by integrating cryptographic keys into the non-volatile memory of the module. TPM is specified by the Trusted Computing Group (TCG). TCG is an initiative started in 2003 by several multinational semiconductor and IT-companies. READ MORE
-
3. Secure Reprogramming of a Network Connected Device : Securing programmable logic controllers
University essay from KTH/Kommunikationssystem, CoSAbstract : This is a master’s thesis project entitled “Secure reprogramming of network connected devices”. The thesis begins by providing some background information to enable the reader to understand the current vulnerabilities of network-connected devices, specifically with regard to cyber security and data integrity. READ MORE
-
4. Trusted terminal-based systems
University essay from Institutionen för systemteknikAbstract : Trust is a concept of increasing importance in today’s information systems where information storage and generation to a higher extent is distributed among several entities throughout local or global networks. This trend in information science requires new ways to sustain the information security in the systems. READ MORE
-
5. Comparative Study of Network Access Control Technologies
University essay from Institutionen för datavetenskapAbstract : This thesis presents a comparative study of four Network Access Control (NAC) technologies; Trusted Network Connect by the Trusted Computing group, Juniper Networks, Inc.’s Unified Access Control, Microsoft Corp.’s Network Access Protection, and Cisco Systems Inc.’s Network Admission Control. READ MORE