Securing Grid Workflows with Trusted Computing
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
A Property-Dependent Agent Transfer Protocol
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Trusted Computing: Security and Applications
Cryptologia
Towards platform-independent trusted computing
Proceedings of the 2009 ACM workshop on Scalable trusted computing
Specification and Standardization of a Java Trusted Computing API
Software—Practice & Experience
Securing mobile agents for crisis management support
Proceedings of the seventh ACM workshop on Scalable trusted computing
Hi-index | 0.00 |
This paper aims to examine the benefits the intro- duction of trusted computing can bring to the mobile agent paradigm, with a specific emphasis on mobile agent security.