• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Shi, Yong (Shi, Yong.) | Han, Zhen (Han, Zhen.) | Shen, Chang-Xiang (Shen, Chang-Xiang.)

Indexed by:

EI Scopus

Abstract:

Using root of trust to build Trusted Computing Platforms is a hot spot of information security research nowadays. According to trusted computing, this paper implements transitive trust in Java environment and builds a trusted Java platform. Malicious Java programs are resisted, and Java applications are managed and controlled by a trusted Java platform that only load and run trustworthy Java programs. © 2009 IEEE.

Keyword:

Machine learning Security of data Java programming language Virtual machine Trusted computing Application programs

Author Community:

  • [ 1 ] [Shi, Yong]School of Computer and Information Technology, Beijing Jiao tong University, Beijing 100044, China
  • [ 2 ] [Han, Zhen]School of Computer and Information Technology, Beijing Jiao tong University, Beijing 100044, China
  • [ 3 ] [Shen, Chang-Xiang]College of Computer Science and Technology, Beijing University of Technology, Beijing 100022, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Year: 2009

Volume: 5

Page: 2802-2805

Language: English

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 3

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 11

Online/Total:660/10645141
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.