An analysis of a secure system based on trusted components
- 23 December 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 17 references indexed in Scilit:
- Remote booting in a hostile world: to whom am I speaking? [Computer securityComputer, 1995
- Why cryptosystems failCommunications of the ACM, 1994
- The Commercial Data Masking Facility (CDMF) data privacy algorithmIBM Journal of Research and Development, 1994
- Transaction Security System extensions to the Common Cryptographic ArchitectureIBM Systems Journal, 1991
- Common Cryptographic Architecture Cryptographic Application Programming InterfaceIBM Systems Journal, 1991
- Questions and Answers about Tiger TeamsEDPACS, 1989
- Make the tigers hunt for youComputers & Security, 1988
- Security Mechanisms in High-Level Network ProtocolsACM Computing Surveys, 1983
- I. `des will be totally insecure within ten years'IEEE Spectrum, 1979
- Operating system penetrationPublished by Association for Computing Machinery (ACM) ,1975