Performance analysis for extended TLS with mutual attestation for platform integrity assurance
A web service is a web-based application connected via the internet connectivity. The common web-based applications are deployed using web browsers and web servers. However, the security of Web Service is a major concern issues since it is not widely studied and integrated in the design stage of Web...
| Main Authors: | Abd Aziz, Norazah, Udzir, Nur Izura, Mahmod, Ramlan |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2014
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/48020/ http://psasir.upm.edu.my/id/eprint/48020/1/Performance%20analysis%20for%20extended%20TLS%20with%20mutual%20attestation%20for%20platform%20integrity%20assurance.pdf |
Similar Items
Extending TLS with mutual attestation for platform integrity assurance
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
by: Abdul Aziz, Nor Azah, et al.
Published: (2014)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
Mutual remote attestation in IPSec based VPN.
by: Abd Aziz, Norazah, et al.
Published: (2012)
by: Abd Aziz, Norazah, et al.
Published: (2012)
Mutual remote attestation in IPSec based VPN
by: Abd Aziz, Norazah, et al.
Published: (2013)
by: Abd Aziz, Norazah, et al.
Published: (2013)
Mutual attestation and integrity verification of RFID system using trusted platform module (TPM) / Mohd Faizal Mubarak
by: Mubarak, Mohd Faizal
Published: (2010)
by: Mubarak, Mohd Faizal
Published: (2010)
Platform Property Certificate for Property-Based Attestation Model
by: Borhan, Nazanin
Published: (2011)
by: Borhan, Nazanin
Published: (2011)
Strategic IT Outsourcing : An Exploration for “Mutually Assured Success”
by: Sia, Choon Long
Published: (2013)
by: Sia, Choon Long
Published: (2013)
Attestation audits revisited : how about performance audits for public companies? / Haji Shafi Mohamad
by: Mohamad, Shafi
Published: (2004)
by: Mohamad, Shafi
Published: (2004)
3D geospatial database from terrestrial /laser scanning (TLS) data
by: Abdul Rahman, Alias, et al.
Published: (2008)
by: Abdul Rahman, Alias, et al.
Published: (2008)
File integrity monitor scheduling based on file security level classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Performance evaluation of identity-based encryption (IBE) remote attestation protocol in wireless sensor networks / Roszainiza Rosli
by: Rosli, Roszainiza
Published: (2014)
by: Rosli, Roszainiza
Published: (2014)
Deformation monitoring of a steel structure using 3D terrestrial laser scanner (TLS)
by: Jatmiko, -, et al.
Published: (2017)
by: Jatmiko, -, et al.
Published: (2017)
Quantification of terrestrial laser scanner (TLS) elevation accuracy in oil palm plantation for IFSAR improvement
by: Muhadi , N. A., et al.
Published: (2016)
by: Muhadi , N. A., et al.
Published: (2016)
Detection of TLS plantlets of oil palm using specific grda markers via pcr approach
by: Wong, Connie Ting Ting
Published: (2015)
by: Wong, Connie Ting Ting
Published: (2015)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
A secure and privacy preserving iris biometric authentication scheme with matrix transformation
by: Udzir, Nur Izura, et al.
Published: (2017)
by: Udzir, Nur Izura, et al.
Published: (2017)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Perlembagaan kerajaan Perak attestasi kedaulatan watan
[Constitution of the government of Perak as the attestation to the indegenous sovereignty]
by: Wan Ahmad Fauzi, Wan Husain
Published: (2021)
by: Wan Ahmad Fauzi, Wan Husain
Published: (2021)
A high performance data integrity assurance based on the determinant technique
by: Ghaeb, J. A., et al.
Published: (2011)
by: Ghaeb, J. A., et al.
Published: (2011)
An oblique-matrix technique for data integrity assurance
by: Ghaeb, Jasin Abdullah, et al.
Published: (2009)
by: Ghaeb, Jasin Abdullah, et al.
Published: (2009)
Assessing performance of mutual funds in Indonesia
by: Abd. Majid, M. Shabri, et al.
Published: (2010)
by: Abd. Majid, M. Shabri, et al.
Published: (2010)
Sharp-edges method in Arabic text steganography
by: Roslan, Nuur Alifah, et al.
Published: (2011)
by: Roslan, Nuur Alifah, et al.
Published: (2011)
Avenues to invest in Equity Mutual Funds and Performance
of Mutual Funds in India and USA
by: Anantpur, Rashmie
Published: (2007)
by: Anantpur, Rashmie
Published: (2007)
Are Australian Universities Engaging with their Annual Freedom of Speech and Academic Freedom Attestation Statements so as to Achieve their Intended Purposes?
by: Levine, Pnina
Published: (2024)
by: Levine, Pnina
Published: (2024)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
Systematic literature review and analysis for Arabic text steganography method practically
by: Roslan, Nuur Alifah, et al.
Published: (2022)
by: Roslan, Nuur Alifah, et al.
Published: (2022)
Analysis of integrity tests for checking integrity constraints in a distributed database
by: Alwan, Ali Amer, et al.
Published: (2007)
by: Alwan, Ali Amer, et al.
Published: (2007)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
Performance of equity mutual funds in Thailand
by: Rujivipat, Anutra
Published: (2018)
by: Rujivipat, Anutra
Published: (2018)
investor sentiment and mutual fund performance
by: Zhang, Xiyue
Published: (2022)
by: Zhang, Xiyue
Published: (2022)
News consumption through SNS platforms:Extended motivational model
by: Ahmed, Ismail Sheikh Yusuf, et al.
Published: (2018)
by: Ahmed, Ismail Sheikh Yusuf, et al.
Published: (2018)
Multimedia files signature analysis in Blackberry Z10
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
by: Abdullah@Selimun, Mohd. Taufik, et al.
Published: (2015)
Buffer overflow attack mitigation via Trusted Platform Module (TPM)
by: Teh, Jia Yew, et al.
Published: (2014)
by: Teh, Jia Yew, et al.
Published: (2014)
An analysis of Australian mutual fund performance and market relationships
by: Pojanavatee, Sasipa
Published: (2013)
by: Pojanavatee, Sasipa
Published: (2013)
Similar Items
-
Extending TLS with mutual attestation for platform integrity assurance
by: Abdul Aziz, Nor Azah, et al.
Published: (2014) -
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014) -
Mutual remote attestation in IPSec based VPN.
by: Abd Aziz, Norazah, et al.
Published: (2012) -
Mutual remote attestation in IPSec based VPN
by: Abd Aziz, Norazah, et al.
Published: (2013) -
Mutual attestation and integrity verification of RFID system using trusted platform module (TPM) / Mohd Faizal Mubarak
by: Mubarak, Mohd Faizal
Published: (2010)