메뉴 건너뛰기




Volumn , Issue , 2004, Pages

Trust but verify: Accountability for network services

Author keywords

[No Author keywords available]

Indexed keywords

CONTRACTUAL RELATIONSHIPS; DESIGN GOAL; INTERNAL STATE; NETWORK SERVICES; NETWORKED SYSTEMS; PRACTICAL USE; SECURITY PROPERTIES; TRUST-BUT-VERIFY;

EID: 77951484135     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1133572.1133585     Document Type: Conference Paper
Times cited : (47)

References (18)
  • 14
    • 0025564050 scopus 로고
    • Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial
    • F. B. Schneider. Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial. ACM Computing Surveys, 22(4):299-319, 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.4 , pp. 299-319
    • Schneider, F.B.1
  • 16
    • 84958045366 scopus 로고    scopus 로고
    • Using a High-Performance, Programmable Secure Coprocessor
    • S. W. Smith, E. R. Palmer, and S. Weingart. Using a High-Performance, Programmable Secure Coprocessor. In Financial Cryptography, pages 73-89, 1998.
    • (1998) Financial Cryptography , pp. 73-89
    • Smith, S.W.1    Palmer, E.R.2    Weingart, S.3
  • 18
    • 0004196480 scopus 로고
    • PhD thesis, Carnegie Mellon University, May
    • B. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, May 1994.
    • (1994) Using Secure Coprocessors
    • Yee, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.