Back to Results
First PageMeta Content
Cryptography / Business law / Copyright law / Trusted Execution Technology / Kernel / Mandatory access control / Attestation clause / Law of obligations / Ring / Computer security / Security / Trusted computing


Trusted Isolation Environment: An Attestation Architecture with Usage Control Model Anbang Ruan1,2, Qingni Shen1,2, Liang Gu2,3, Li Wang1,2, Lei Shi2,3, Yahui Yang1,2, and Zhong Chen1,2,3 1
Add to Reading List

Document Date: 2010-11-11 21:05:05


Open Document

File Size: 221,51 KB

Share Result on Facebook

Company

AMD / China 2 Key Laboratory / Intel / Trusted Computing Group / /

Country

China / /

/

Facility

Peking University / Key Laboratory of High Confidence Software Technologies / Institute of Software / /

IndustryTerm

trust chain / policy management / remote server / malicious applications / software / remote systems / software stacks / kernel services / banking / software components / secure hardware / computing / particular applications / /

Organization

Attestation Authority / AA Command / School of EECS / Institute of Software / School of Software and Microelectronics / Peking University / Beijing / /

Person

Min Xu / Jaehong Park / Ravi Sandhu / /

Position

Administrator / MAC model / isolation / monitor enforcement driver / /

ProvinceOrState

Arkansas / /

SocialTag