메뉴 건너뛰기




Volumn 5, Issue , 2009, Pages 2802-2805

The transitive trust in java virtual machines

Author keywords

Information security; Java class loading; Transitive trust; Trusted computing; Trusted java platform

Indexed keywords

INFORMATION SECURITY; JAVA CLASS LOADING; TRANSITIVE TRUST; TRUSTED COMPUTING; TRUSTED JAVA PLATFORM;

EID: 70350707890     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMLC.2009.5212620     Document Type: Conference Paper
Times cited : (3)

References (7)
  • 3
    • 85084162270 scopus 로고    scopus 로고
    • Leendert van Doorn. Design and implementa-tion of a TCG-based integrity measurement architecture
    • San Diego
    • Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn. Design and implementa-tion of a TCG-based integrity measurement architecture. The 13th Usenix Security Symposium. San Diego, 2004.
    • (2004) The 13th Usenix Security Symposium
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3
  • 4
    • 34249984223 scopus 로고    scopus 로고
    • A Trusted Bootstrap Scenario Based Trusted Server
    • Huang Tao, Shen Chang-Xiang. A Trusted Bootstrap Scenario Based Trusted Server. Journal of Wuhan University, Vol. 50, No. S1, pp. 12-14, 2004.
    • (2004) Journal of Wuhan University , vol.50 , Issue.S1 , pp. 12-14
    • Tao, H.1    Shen, C.-X.2
  • 5
    • 37449001498 scopus 로고    scopus 로고
    • Transitive Trust and Performance Analysis in Windows Environment
    • Li Xiao-Yong, Shen Chang-Xiang. Transitive Trust and Performance Analysis in Windows Environment. Journal of Computer Research and Development, Vol. 44, No. 11, pp. 1889-1895, 2007.
    • (2007) Journal of Computer Research and Development , vol.44 , Issue.11 , pp. 1889-1895
    • Li, X.-Y.1    Shen, C.-X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.