Idiosyncratic signatures for authenticated execution of management code

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from which they have emanated is not changed prior to and during execution. TrustedFlow™ can be used to create a run-time trust relationship between the components of a distributed management system. © IFIP International Federation for Information Processing 2003.

Cite

CITATION STYLE

APA

Baldi, M., Ofek, Y., & Yung, M. (2003). Idiosyncratic signatures for authenticated execution of management code. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2867, 204–206. https://doi.org/10.1007/978-3-540-39671-0_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free