![]() |
Volumn 33, Issue 1, 2010, Pages 74-81
|
A formal method based on noninterference for analyzing trust chain of trusted computing platform
|
Author keywords
Noninterference; Security policy; Trust chain; Trusted computing
|
Indexed keywords
CHAIN TRANSFER;
COMPUTING PLATFORM;
INFORMATION FLOWS;
INTEGRITY MEASUREMENT;
INTRANSITIVE NON-INTERFERENCE;
NONINTERFERENCE;
RUNTIMES;
SECURITY POLICY;
TRUST MODELS;
TRUSTED COMPUTING;
TRUSTED COMPUTING PLATFORM;
FORMAL METHODS;
SECURITY SYSTEMS;
SECURITY OF DATA;
|
EID: 77949561278
PISSN: 02544164
EISSN: None
Source Type: Journal
DOI: 10.3724/SP.J.1016.2010.00074 Document Type: Article |
Times cited : (23)
|
References (7)
|