Login / Signup
Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access Technology.
Zhenyu Wang
Xiangdong Li
Lining Yao
Qi Feng
Ruimin Wang
Published in:
EUC (2) (2008)
Keyphrases
</>
case study
data processing
rapid development
cost effective
networking technologies
endpoints
key technologies
access control
personal computer
trusted platform module
data mining
trusted computing
digital resources
internet services
website
multimedia
information systems