中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR

Search Results

Help

Item hits: (Results 1-6 of 6)

Items/Page:    Sort:
towards remote attestation of security policies [会议论文]
2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010, Wuhan, Hubei, April 24,
Qian Zhang; Yeping He; Ce Meng
  |  
 
research on a software trustworthy measure model [会议论文]
2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010, Wuhan, Hubei, China, April 24,
Yu Benhai; Wang Qing; Yang Ye
  |  
 
a hypervisor-based secure storage scheme [会议论文]
2nd International Conference on Networks Security, Wireless Communications and Trusted Computing, NSWCTC 2010, Wuhan, Hubei, April 24,
Dan Wang; Dengguo Feng
  |  
 
remote attestation for custom-built software [会议论文]
International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, PEOPLES R CHINA, APR 25-26,
Meng Ce; He Yeping; Zhang Qian

 
a state-adaptive access control model for web-based idrs system [会议论文]
International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, PEOPLES R CHINA, APR 25-26,
Wu Xinsong; He Yeping; Zhou Zhouyi
  |  
 
the study of trustworthy software process improvement model [会议论文]
International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, PEOPLES R CHINA, APR 25-26,
Yu Benhai; Wang Qing; Yang Ye
  |  
 

1

 

Valid XHTML 1.0!
Copyright © 2007-2019  中国科学院软件研究所 - Feedback
Powered by CSpace