Attestation-based policy enforcement for remote access
- 25 October 2004
- proceedings article
- Published by Association for Computing Machinery (ACM)
- p. 308-317
- https://doi.org/10.1145/1030083.1030125
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- TerraPublished by Association for Computing Machinery (ACM) ,2003
- Access control with IBM Tivoli access managerACM Transactions on Information and System Security, 2003
- Enhancing operating system resistance to information warfarePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Secure coprocessor-based intrusion detectionPublished by Association for Computing Machinery (ACM) ,2002
- Building the IBM 4758 secure coprocessorComputer, 2001
- Implementing a distributed firewallPublished by Association for Computing Machinery (ACM) ,2000
- Role-based access control modelsComputer, 1996
- A Comparison of Commercial and Military Computer Security PoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1987
- Computer Security Technology Planning Study. Volume 2Published by Defense Technical Information Center (DTIC) ,1972