메뉴 건너뛰기




Volumn 13, Issue 5, 2008, Pages 523-527

A Peer-to-Peer resource sharing scheme using trusted computing technology

Author keywords

Chain of trust; Resource sharing; Trusted computing; UCON (usage control); Virtualization

Indexed keywords


EID: 57049177662     PISSN: 10071202     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11859-008-0503-8     Document Type: Article
Times cited : (2)

References (11)
  • 9
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems[J]
    • 1
    • E. Bertino E. Ferrari V. Atluri 1999 The Specification and Enforcement of Authorization Constraints in Workflow Management Systems[J] ACM Transactions on Information and System Security 2 1 65 104
    • (1999) ACM Transactions on Information and System Security , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.