Study on Protection Mechanism of Information Security in an Intranet Based on Trusted Computing
暂无分享,去创建一个
[1] Erdem Uçar,et al. The positive outcomes of information security awareness training in companies - A case study , 2009, Inf. Secur. Tech. Rep..
[2] Yue Yu,et al. Optimization of Program Behavior Model for Trusted Computing Dynamic Attestation , 2011 .
[3] Said Gharout,et al. Trusted Platform Module as an Enabler for Security in Cloud Computing , 2011, 2011 Conference on Network and Information Systems Security.
[4] Jiang Zhi-xiang. Design and implementation of hardware platform for trusted computing , 2011 .
[5] Chao Yang,et al. Anonymous Authentication Scheme for Wireless IP Networks under Trusted Computing , 2011 .
[6] R. Russell,et al. Species at risk: Data and knowledge management within the WILDSPACETM Decision Support System , 2007, Environ. Model. Softw..
[7] Fang Ming-wei,et al. A Trusted Portable Computing Device , 2012 .
[8] Cédric Fournet,et al. Compiling Information-Flow Security to Minimal Trusted Computing Bases , 2011, ESOP.
[9] Hao Tian,et al. A New Anonymous Authentication Method Based on One-way Accumulator , 2010, J. Convergence Inf. Technol..
[10] Shibin Zhang,et al. Study on Terminal Trusted Model Based on Trusted Computing , 2011 .
[11] Andreas Leicher,et al. Trusted computing enhanced user authentication with OpenID and trustworthy user interface , 2011 .
[12] Yeu-Pong Lai,et al. The implementation guidance for practicing network isolation by referring to ISO-17799 standard , 2009, Comput. Stand. Interfaces.
[13] K. Nikus,et al. The role of continuous monitoring in a 24/7 telecardiology consultation service--a feasibility study. , 2009, Journal of electrocardiology.