Title :
Network Computing Based on the Credibility of Environmental Studies
Author :
Wang, Yuhua ; Gu, Dawei
Author_Institution :
Sch. of Inf. Sci. & Eng., Henan Univ. of Technol., Zheng Zhou, China
Abstract :
The application of network computing technology, more and more widely, its security is particularly important to the emergence of trusted computing research for the security of network computing application technology research has provided new opportunities. In this paper, the credibility of Web-based computing environment, the structure of thought and its implementation model.
Keywords :
Internet; computer network security; Web-based computing environment; environmental studies; network computing; network security; trusted computing; Computational modeling; Computer architecture; Computers; Hardware; Privacy; Security; Software; network computing; network security; trusted computing; trusted environment; trusted network connect;
Conference_Titel :
Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on
Conference_Location :
Huanggang
Print_ISBN :
978-1-4244-8148-4
Electronic_ISBN :
978-0-7695-4196-9
DOI :
10.1109/IPTC.2010.55