Modeling trusted computing
From MaRDI portal
Publication:3443202
Recommendations
Cited in
(8)- A separated domain-based kernel model for trusted computing
- scientific article; zbMATH DE number 1950332 (Why is no real title available?)
- Formal verification of establishment of chain of trust in trusted computing
- Formal Techniques for Networked and Distributed Systems – FORTE 2004
- Digital forensics of trusted computing environment
- Analyzing the Chain of Trust Model Based on Entity Dependence
- A behavior-based remote trust attestation model
- A vector model of trust for developing trustworthy systems
This page was built for publication: Modeling trusted computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3443202)