|
Volumn , Issue , 2005, Pages 11-28
|
Concepts of trusted computing
a
a
NONE
|
Author keywords
Agent technology; Authorisation; Communication infrastructure; Data authorisation; Data privacy; Secret key; Software agent; Software agents; Ubiquitous computing; Ubiquitous trusted computing
|
Indexed keywords
ACCESS CONTROL;
DATA PRIVACY;
SOFTWARE AGENTS;
UBIQUITOUS COMPUTING;
AGENT TECHNOLOGY;
AUTHORISATION;
COMMUNICATION INFRASTRUCTURE;
DATA AUTHORISATION;
SECRET KEY;
TRUSTED COMPUTING;
|
EID: 85013596514
PISSN: None
EISSN: None
Source Type: Book
DOI: 10.1049/PBPC006E_ch2 Document Type: Chapter |
Times cited : (9)
|
References (5)
|