Retaining control over private virtual machines hosted by a cloud provider using mandatory access control, trusted boot and attestation

A Simma, P Rusch - … European Conference on Cyber Warfare and …, 2014 - books.google.com
The Trusted Platform Module (TPM) has been heavily criticized because it is accused of
taking control over a personal computer from the owner. Interestingly and ironically this is …

[PDF][PDF] 13th European Conference on Cyber Warfare and Security

A Liaropoulos, G Tsihrintzis - 2014 - academia.edu
Originally isolated by design, Critical Infrastructures (CI) based on Industrial Control Systems
(ICS)–such as SCADA (Supervisory Control and Data Acquisition) systems-were born within …