Modeling trusted computing
From MaRDI portal
Publication:3443202
DOI10.1007/BF02831808zbMATH Open1119.68080OpenAlexW1497129186MaRDI QIDQ3443202FDOQ3443202
Authors: Shu-Yi Chen, Yingyou Wen, Hong Zhao
Publication date: 1 June 2007
Published in: Wuhan University Journal of Natural Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/bf02831808
Recommendations
Cites Work
Cited In (8)
- A separated domain-based kernel model for trusted computing
- Title not available (Why is that?)
- Formal verification of establishment of chain of trust in trusted computing
- Formal Techniques for Networked and Distributed Systems – FORTE 2004
- Digital forensics of trusted computing environment
- Analyzing the Chain of Trust Model Based on Entity Dependence
- A behavior-based remote trust attestation model
- A vector model of trust for developing trustworthy systems
This page was built for publication: Modeling trusted computing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3443202)