Login / Signup
High Time for Trusted Computing.
Bruce Potter
Published in:
IEEE Secur. Priv. (2009)
Keyphrases
</>
trusted computing
computing environments
response time
access control
business processes
business process