Scheduling execution of credentials in constrained secure environments

Jan-Erik Ekberg, N. Asokan, Kari Kostiainen, Aarne Rantala. Scheduling execution of credentials in constrained secure environments. In Shouhuai Xu, Cristina Nita-Rotaru, Jean-Pierre Seifert, editors, Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008. pages 61-70, ACM, 2008. [doi]

Authors

Jan-Erik Ekberg

This author has not been identified. Look up 'Jan-Erik Ekberg' in Google

N. Asokan

This author has not been identified. Look up 'N. Asokan' in Google

Kari Kostiainen

This author has not been identified. Look up 'Kari Kostiainen' in Google

Aarne Rantala

This author has not been identified. Look up 'Aarne Rantala' in Google