Scheduling execution of credentials in constrained secure environments

Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala. Scheduling execution of credentials in constrained secure environments. In Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert, editors, Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008. pages 61-70, ACM, 2008. [doi]

Abstract

Abstract is missing.