Login / Signup
A Comparison of the trusted Computing Group Security Model with Clark-Wilson.
Ned M. Smith
Published in:
Security and Management (2004)
Keyphrases
</>
security model
trusted computing
access control
security requirements
public key
security analysis
real time
computing environments
computing platform
multi agent
wireless sensor networks
virtual organization