메뉴 건너뛰기




Volumn , Issue , 2008, Pages 434-439

Application-oriented trust in distributed computing

Author keywords

[No Author keywords available]

Indexed keywords

CANNING; CODES (STANDARDS); CODES (SYMBOLS); COMPUTER CRIME; QUALITY ASSURANCE; RELIABILITY;

EID: 49049113110     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2008.21     Document Type: Conference Paper
Times cited : (18)

References (11)
  • 2
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - tools for software protection
    • August
    • C. S. Collberg and C. Thomborson. Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Transactions on Software Engineering, 28(8), August 2002.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8
    • Collberg, C.S.1    Thomborson, C.2
  • 3
    • 0001943763 scopus 로고    scopus 로고
    • Time limited blackbox security: Protecting mobile agents from malicious hosts
    • Springer-Verlag
    • F. Hohl. Time limited blackbox security: Protecting mobile agents from malicious hosts. In Mobile Agents and Security. Springer-Verlag, 1998.
    • (1998) Mobile Agents and Security
    • Hohl, F.1
  • 5
    • 85028170979 scopus 로고    scopus 로고
    • Establishing the genuinity of remote computer systems
    • Washington, DC, August
    • R. Kennell and L. H. Jamieson. Establishing the genuinity of remote computer systems. In USENIX Security Symposium, Washington, DC, August 2003.
    • (2003) USENIX Security Symposium
    • Kennell, R.1    Jamieson, L.H.2
  • 8
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • San Diego, CA, August
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, San Diego, CA, August 2004.
    • (2004) USENIX Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 9
    • 0003197918 scopus 로고    scopus 로고
    • Protecting mobile agents against malicious hosts
    • Springer-Verlag
    • T. Sander and C. F. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security. Springer-Verlag, 1998.
    • (1998) Mobile Agents and Security
    • Sander, T.1    Tschudin, C.F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.