Login / Signup
A trusted computing architecture for critical infrastructure protection.
Mike Burmester
Published in:
IISA (2013)
Keyphrases
</>
trusted computing
computing platform
virtual organization
real time
cloud computing
computing environments
software architecture
information flow
computer security
data mining
sensor networks
computer systems
fine grained
computing systems