Computer Science ›› 2008, Vol. 35 ›› Issue (11): 39-41.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Trusted computing is a significant research aspect of information security. The problem is urgent to resolve that how to evaluate the trust level of trusted computing model The theories of trusted root, trusted chain and influence factors of trust were st

Key words: Trusted computing,Trusted computing platform, Chain of trust, Trust level, Fuzzy set

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!