SCIRP Mobile Website
Paper Submission

Why Us? >>

  • - Open Access
  • - Peer-reviewed
  • - Rapid publication
  • - Lifetime hosting
  • - Free indexing service
  • - Free promotion service
  • - More citations
  • - Search engine friendly

Free SCIRP Newsletters>>

Add your e-mail address to receive free newsletters from SCIRP.


Contact Us >>

Article citations


Berger, S., et al. (2006) vTPM: Virtualizing the Trusted Platform Module. Security’06: 15th USENIX Security Symposium, Vancouver, BC, 31 July-4 August 2006, 305-320.

has been cited by the following article:

  • TITLE: Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment

    AUTHORS: Ahmad Fayez S. Althobaiti

    KEYWORDS: Cloud Computing, Security Threats, Virtual Machine Monitors, Cloud Security

    JOURNAL NAME: Journal of Information Security, Vol.8 No.1, December 7, 2016

    ABSTRACT: The data and applications in cloud computing reside in cyberspace, that allowing to users access data through any connection device, when you need to transfer information over the cloud, you will lose control of it. There are multi types of security challenge must be understood and countermeasures. One of the major security challenges is resources of the cloud computing infrastructures are provided as services over the Internet, and entire data in the cloud computing are reside over network resources, that enables the data to be access through VMs. In this work, we describe security techniques for securing a VCCI, VMMs such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Virtual Trusted Platform Module (vTPM), Virtual Firewall (VF), and Trusted Virtual Domains (TVDs). In this paper we focus on security of virtual resources in Virtualized Cloud Computing Infrastructure (VCCI), Virtual Machine Monitor (VMM) by describing types of attacks on VCCI, and vulnerabilities of VMMs and we describe the techniques for securing a VCCI.