A Trusted Computing Model Based on Code Authorization.
Guoheng WeiXueguang ZhouHuanguo ZhangPublished in: ISIP (2008)
Keyphrases
- trusted computing
- access control policies
- access control
- computing environments
- computing platform
- conflict resolution
- cloud computing
- source code
- virtual organization
- remote attestation
- computer security
- fine grained
- trusted platform module
- information flow
- role based access control
- database
- response time
- database systems
- case study