An Approach for Compliance Validation of Trusted Computing Applications

Qi Cui, Wenchang Shi. An Approach for Compliance Validation of Trusted Computing Applications. In Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008. pages 574-579, IEEE Computer Society, 2008. [doi]

@inproceedings{CuiS08,
  title = {An Approach for Compliance Validation of Trusted Computing Applications},
  author = {Qi Cui and Wenchang Shi},
  year = {2008},
  doi = {10.1109/WKDD.2008.25},
  url = {http://doi.ieeecomputersociety.org/10.1109/WKDD.2008.25},
  tags = {systematic-approach},
  researchr = {https://researchr.org/publication/CuiS08},
  cites = {0},
  citedby = {0},
  pages = {574-579},
  booktitle = {Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008},
  publisher = {IEEE Computer Society},
}