共 50 条
- [21] White List Security Management Mechanism based on Trusted Computing Technology PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1369 - 1377
- [22] A Security Technology for Mobile Agent System Improved by Trusted Computing Platform HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 3, PROCEEDINGS, 2009, : 46 - +
- [23] Research on Smart Mobile Terminal Security Technology Based on Trusted Computing AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 3278 - 3281
- [24] Enhancing Java']Java grid computing security with resource control GRID SERVICES ENGINEERING AND MANAGEMENT, PROCEEDINGS, 2004, 3270 : 30 - 47
- [25] Enhancing grid security infrastructure to support mobile computing nodes INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 42 - 54
- [26] Securing Grid workflows with Trusted Computing COMPUTATIONAL SCIENCE - ICCS 2008, PT 3, 2008, 5103 : 510 - 519
- [27] Securing Grid Workflows with Trusted Computing CCGRID 2008: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, VOLS 1 AND 2, PROCEEDINGS, 2008, : 700 - 700
- [28] Enhancing security of computing platforms with TC-technology ISSE 2004 - SECURING ELECTRONIC BUSINESS PROCESSES, 2004, : 346 - 361
- [29] Building trusted sub-domain for the Grid with trusted computing INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 463 - +
- [30] Daonity: Protocol Solutions to Grid Security Using Hardware Strengthened Software Environment SECURITY PROTOCOLS, 2010, 5964 : 204 - +