Author:
Itani Wassim,Ghali Cesar,Kayssi Ayman,Chehab Ali
Publisher
Springer Berlin Heidelberg
Reference38 articles.
1. Bajikar S (2002) Trusted platform module (TPM)-based security on notebook PCs-white paper. Mobile Platforms Group, Intel Corp
2. Chang E, Dillon T , Hussain FK (2006) Trust and reputation for service-oriented environments. Wiley, London
3. Coveillo A, Elias H, Gelsinger P, Mcaniff R (2011) Proof, not promises: creating the trusted cloud, RSA white paper. http://www.rsa.com/innovation/docs/11319_TVISION_WP_0211.pdf
4. Cusumano M (2010) Cloud computing and SaaS as new computing platforms. Commun ACM 53(4):27
5. Diffie W, van Oorschot PC, Wiener MJ (1992) Authentication and authenticated key exchanges. Des Codes Crypt 2:107–125
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献