|
Volumn 2, Issue , 2008, Pages 89-93
|
Research on endpoint isolation and remediation mechanism based on trusted access technology
|
Author keywords
Isolation and remediation mechanism; Security policy; Trusted access; Trusted computing; Trusted network connection
|
Indexed keywords
ISOLATION AND REMEDIATION MECHANISM;
SECURITY POLICY;
TRUSTED ACCESS;
TRUSTED COMPUTING;
TRUSTED NETWORK CONNECTION;
POLLUTION;
SECURITY SYSTEMS;
WIRELESS NETWORKS;
UBIQUITOUS COMPUTING;
|
EID: 63149133886
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/EUC.2008.52 Document Type: Conference Paper |
Times cited : (1)
|
References (14)
|