Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing.
Xinwen ZhangFrancesco Parisi-PresicceRavi S. SandhuPublished in: IWSEC (2006)
Keyphrases
- trusted computing
- computing environments
- policy enforcement
- access control
- cloud computing
- computing platform
- enterprise network
- mobile devices
- trusted platform module
- network access
- security management
- source code
- mobile computing
- information security
- computer security
- virtual organization
- mobile users
- mobile agents
- information systems
- access control policies
- security policies