|
Volumn , Issue , 2012, Pages 5-9
|
The analysis and design of trusted computing applied into cloud
|
Author keywords
(CUM); cloud computing; Configuration Dynamic Update Module; Service Authentication List Management (SAL); system survivability; trusted computing
|
Indexed keywords
(CUM);
DYNAMIC UPDATE;
SERVICE AUTHENTICATION;
SYSTEM SURVIVABILITY;
TRUSTED COMPUTING;
CLOUD COMPUTING;
HARDWARE;
SECURITY OF DATA;
|
EID: 84867384322
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ICSGRC.2012.6287124 Document Type: Conference Paper |
Times cited : (6)
|
References (10)
|