Map
Index
Random
Help
th

Quote: with a remote boot protocol can have high confidence in the integrity of a system despite a hostile environment and network

topics > all references > references i-l > QuoteRef: lomaM1_1995 , p. 54



Topic:
distributed system security
Topic:
security of remotely executed code

Quotation Skeleton

With our protocol, a user can approach a … workstation, and then download a system kernel and … across a public access network with no security … state it would have been if the user …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: distributed system security (16 items)
Topic: security of remotely executed code (22 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.