Login / Signup
Integrating cryptography in the trusted computing base.
Michael Roe
Tom Casey
Published in:
ACSAC (1990)
Keyphrases
</>
trusted computing
computing environments
computing platform
computer security
cloud computing
trusted platform module
information security
virtual organization
database systems
multi agent
peer to peer