Login / Signup
Secure bootstrap is not enough: shoring up the trusted computing base.
James Hendricks
Leendert van Doorn
Published in:
ACM SIGOPS European Workshop (2004)
Keyphrases
</>
trusted computing
computing environments
cloud computing
computing platform
computer security
remote attestation
trusted platform module
virtual organization
factor authentication
database
data mining
digital libraries