{"id":"https://openalex.org/W3006313920","doi":"https://doi.org/10.1109/access.2020.2969768","title":"IEEE Access Special Section Editorial: Trusted Computing","display_name":"IEEE Access Special Section Editorial: Trusted Computing","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3006313920","doi":"https://doi.org/10.1109/access.2020.2969768","mag":"3006313920"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2969768","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2969768","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08989842.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08989842.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078219471","display_name":"Zheng Yan","orcid":"https://orcid.org/0000-0002-9697-2108"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I9927081","display_name":"Aalto University","ror":"https://ror.org/020hwjq30","country_code":"FI","type":"education","lineage":["https://openalex.org/I9927081"]}],"countries":["CN","FI"],"is_corresponding":true,"raw_author_name":"Zheng Yan","raw_affiliation_strings":["Aalto University, Espoo, Finland","Xidian University, Xi\u2019an, China","Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Aalto University, Espoo, Finland","institution_ids":["https://openalex.org/I9927081"]},{"raw_affiliation_string":"Xidian University, Xi\u2019an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020354604","display_name":"Venu Govindaraju","orcid":"https://orcid.org/0000-0002-5318-7409"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Venu Govindaraju","raw_affiliation_strings":["University at Buffalo, Buffalo, USA"],"affiliations":[{"raw_affiliation_string":"University at Buffalo, Buffalo, USA","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041083459","display_name":"Qinghua Zheng","orcid":"https://orcid.org/0000-0002-8436-4754"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qinghua Zheng","raw_affiliation_strings":["Xi\u2019an Jiaotong University, Xi\u2019an, China","Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100322712","display_name":"Yan Wang","orcid":"https://orcid.org/0000-0002-5344-1884"},"institutions":[{"id":"https://openalex.org/I99043593","display_name":"Macquarie University","ror":"https://ror.org/01sf06y89","country_code":"AU","type":"education","lineage":["https://openalex.org/I99043593"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yan Wang","raw_affiliation_strings":["Macquarie University, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Macquarie University, Sydney, Australia","institution_ids":["https://openalex.org/I99043593"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5078219471"],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I9927081"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.9279,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.79700096,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"8","issue":null,"first_page":"25722","last_page":"25726"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.982699990272522,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/trusted-platform-module","display_name":"Trusted Platform Module","score":0.9173128604888916},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.9171947836875916},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.9031596183776855},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7780808806419373},{"id":"https://openalex.org/keywords/trusted-network-connect","display_name":"Trusted Network Connect","score":0.6076763272285461},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.5465306639671326},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5164006352424622},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49480170011520386},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4742126762866974},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.471851110458374},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.40059593319892883},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.28535038232803345},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.09252092242240906}],"concepts":[{"id":"https://openalex.org/C202775310","wikidata":"https://www.wikidata.org/wiki/Q1140366","display_name":"Trusted Platform Module","level":2,"score":0.9173128604888916},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.9171947836875916},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.9031596183776855},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7780808806419373},{"id":"https://openalex.org/C206149592","wikidata":"https://www.wikidata.org/wiki/Q3999882","display_name":"Trusted Network Connect","level":3,"score":0.6076763272285461},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.5465306639671326},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5164006352424622},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49480170011520386},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4742126762866974},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.471851110458374},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.40059593319892883},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.28535038232803345},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.09252092242240906}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2969768","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2969768","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08989842.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:7d840fd993764271ba992423ba1e86f5","is_oa":true,"landing_page_url":"https://doaj.org/article/7d840fd993764271ba992423ba1e86f5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 25722-25726 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2969768","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2969768","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08989842.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3006313920.pdf","grobid_xml":"https://content.openalex.org/works/W3006313920.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W1481397730","https://openalex.org/W1937767493","https://openalex.org/W2065370685","https://openalex.org/W2074709832","https://openalex.org/W2092229063","https://openalex.org/W2519033667","https://openalex.org/W2598466085","https://openalex.org/W2797377272","https://openalex.org/W2801299695","https://openalex.org/W2948639074","https://openalex.org/W4214651558"],"related_works":["https://openalex.org/W2355956995","https://openalex.org/W2372678089","https://openalex.org/W104943326","https://openalex.org/W2381474365","https://openalex.org/W2354645290","https://openalex.org/W2390768934","https://openalex.org/W2389819096","https://openalex.org/W2001281341","https://openalex.org/W2371948564","https://openalex.org/W2383968738"],"abstract_inverted_index":{"Trusted":[0,11,42,195],"Computing":[1,12],"(TC)":[2],"is":[3,40,54,123,168],"a":[4,26,46,51,57,74,95,117,223],"technology":[5,236],"developed":[6],"and":[7,15,23,60,66,81,90,113,131,137,145,152,165,181,190,201,240],"promoted":[8],"by":[9,56],"the":[10,19,34,41,124,173],"Group":[13],"(TCG),":[14],"aims":[16],"to":[17,62,128],"enhance":[18],"overall":[20],"security,":[21],"privacy":[22],"trustworthiness":[24],"of":[25,28,33,38,76,97,175,207,226,243],"variety":[27],"computing":[29,36,120],"devices.":[30],"The":[31,204],"core":[32],"trusted":[35,163,176,199,202],"technologies":[37],"TCG":[39,91],"Platform":[43,77],"Module":[44],"(TPM),":[45],"tamper-resistant":[47],"module":[48,127,188],"embedded":[49],"in":[50,133,172,178,222,230],"platform,":[52],"which":[53,217],"implemented":[55],"TPM":[58,70,89,122],"chip":[59],"designed":[61],"resist":[63],"software":[64,147,193],"attacks":[65],"moderate":[67],"hardware":[68],"attacks.":[69],"includes":[71],"non-volatile":[72],"storage,":[73,110],"set":[75],"Configuration":[78],"Registers":[79],"(PCRs)":[80],"an":[82,231],"engine":[83],"for":[84],"cryptographic":[85],"operations.":[86],"Based":[87],"on":[88,186],"Software":[92,209],"Stack":[93],"(TSS),":[94],"suite":[96],"mechanisms":[98],"can":[99,141],"be":[100],"realized,":[101],"including":[102],"memory":[103],"curtaining,":[104],"protected":[105],"execution,":[106],"secure":[107,119,143],"I/O,":[108],"sealed":[109],"platform":[111],"measurement":[112],"remote":[114,160],"attestation.":[115],"As":[116],"fundamental":[118],"module,":[121],"root":[125],"trust":[126,132],"establish":[129],"security":[130],"digital":[134],"computing,":[135,177],"communication":[136],"networking.":[138],"Basically,":[139],"it":[140],"support":[142],"booting":[144],"trustworthy":[146,192],"installation,":[148],"private":[149,224],"data":[150],"protection":[151],"Digital":[153],"Rights":[154],"Management":[155],"(DRM),":[156],"as":[157,159],"well":[158],"attestation-":[161],"based":[162],"communications":[164],"collaboration.":[166],"There":[167],"significant":[169],"research":[170],"currently":[171],"field":[174],"both":[179],"academia":[180],"industry.":[182],"Recent":[183],"efforts":[184],"focus":[185],"TC":[187],"development":[189],"extension,":[191],"assurance,":[194],"Execution":[196],"Environment":[197],"(TEE),":[198],"collaboration":[200],"storage.":[203],"recent":[205],"advance":[206],"Intel":[208],"Guard":[210],"Extensions":[211],"(Intel\u00ae":[212],"SGX)":[213],"offers":[214],"hardware-assistant":[215],"TEE,":[216],"allows":[218],"user":[219],"code":[220],"execution":[221],"region":[225],"memory,":[227],"called":[228],"enclave,":[229],"untrusted":[232],"third":[233],"party.":[234],"This":[235],"attracts":[237],"special":[238],"attention":[239],"motivates":[241],"innovations":[242],"many":[244],"applications.":[245]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
