Login / Signup

Integrating cryptography in the trusted computing base.

Michael RoeTom Casey
Published in: ACSAC (1990)
Keyphrases
  • trusted computing
  • computing environments
  • computing platform
  • computer security
  • cloud computing
  • trusted platform module
  • information security
  • virtual organization
  • database systems
  • multi agent
  • peer to peer