Indexed by:
Abstract:
Using root of trust to build Trusted Computing Platforms is a hot spot of information security research nowadays. According to trusted computing, this paper implements transitive trust in Java environment and builds a trusted Java platform. Malicious Java programs are resisted, and Java applications are managed and controlled by a trusted Java platform that only load and run trustworthy Java programs. © 2009 IEEE.
Keyword:
Reprint Author's Address:
Email:
Source :
Year: 2009
Volume: 5
Page: 2802-2805
Language: English
Cited Count:
SCOPUS Cited Count: 3
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 11
Affiliated Colleges: