Login / Signup
Trusted Computing ohne Nebenwirkungen - Spezifikationen der Trusted Computing Group sinnvoll nutzen.
Dirk Günnewig
Ahmad-Reza Sadeghi
Christian Stüble
Published in:
Datenschutz und Datensicherheit (2003)
Keyphrases
</>
trusted computing
computing environments
computing platform
cloud computing
computer security
remote attestation
virtual organization
trusted platform module
database
case study
data processing
computing systems