Computer Science ›› 2008, Vol. 35 ›› Issue (11): 39-41.
Previous Articles Next Articles
Online:
Published:
Abstract: Trusted computing is a significant research aspect of information security. The problem is urgent to resolve that how to evaluate the trust level of trusted computing model The theories of trusted root, trusted chain and influence factors of trust were st
Key words: Trusted computing,Trusted computing platform, Chain of trust, Trust level, Fuzzy set
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I11/39
Cited