共 50 条
- [41] A trusted computing model based on code authorization 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +
- [43] A Secure Trust Model Based on Trusted Computing 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 170 - 176
- [44] A LDAP SYNCHRONIZATION MODEL BASED ON TRUSTED COMPUTING PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2771 - 2774
- [45] A Trust Model for Heterogeneous Trusted Computing Architectures NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 539 - +
- [46] Data Provenance Trusted Model in Cloud Computing 2013 INTERNATIONAL CONFERENCE ON RESEARCH AND INNOVATION IN INFORMATION SYSTEMS (ICRIIS), 2013, : 257 - 262
- [47] Research on Automated Testing of the Trusted Platform Model PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2335 - 2339
- [50] Seal-based secure boot scheme for trusted computing platform Journal of China Universities of Posts and Telecommunications, 2010, 17 (SUPPL. 2): : 16 - 21