Formal Definitions for Trust in Trusted Computing
暂无分享,去创建一个
[1] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[2] Sergey Bratus,et al. TOCTOU, Traps, and Trusted Computing , 2008, TRUST.
[3] G Stoneburner. Underlying Technical Models for Information Technology Security | NIST , 2001 .
[4] Zhaoyu Liu,et al. A Formal Definition for Trust in Distributed Systems , 2005, ISC.
[5] M. Sloman,et al. A Survey of Trust in Internet Applications I E E E C O M M U N I C a T I O N S , 2000 .
[6] Zhang Huanguo,et al. Development of trusted computing research , 2008, Wuhan University Journal of Natural Sciences.
[7] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[8] Vladimiro Sassone,et al. A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[9] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[10] Zhenfu Cao,et al. Survey of information security , 2007, Science in China Series F: Information Sciences.
[11] Gary Stoneburner,et al. Underlying technical models for information technology security :: recommendations of the National Institute of Standards and Technology , 2001 .
[12] William J. Caelli,et al. 50 Years of Isolation , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[13] Leendert van Doorn,et al. A Practical Guide to Trusted Computing , 2007 .
[14] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[15] Bo Zhao,et al. Research on trusted computing and its development , 2010, Science China Information Sciences.
[16] Xing Zhang,et al. A Novel Secure Terminal System Based on Trusted Hardware: U-Key , 2009, J. Comput..
[17] Dilsun Kirli Kaynar,et al. A Logic of Secure Systems and its Application to Trusted Computing , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[18] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.