First Page | Meta Content | |
---|---|---|
Document Date: 2005-12-09 20:49:49Open Document File Size: 105,18 KBShare Result on FacebookCompanyIBM / Aegis / VMWare / Intel / Microsoft / Trusted Computing Group / / /EventFDA Phase / /FacilityComputer Science University of California Irvine / Java port / /IndustryTermuntrusted network protocols / commodity software / client-server network / distributed computing project / distributed computing application / software patches / assurance closed systems / heterogeneous systems / distributed computing / interface just like real hardware / simplified peer-to-peer networking protocol / commodity systems / homogeneous computing environment / network protocol / revocation infrastructure / hardware device / commodity open systems / Legacy applications / system software / models and applications / particular algorithm / distributed computing projects / software support / remote server / peerto-peer protocols / cryptographic protocols / Internet Mersenne Prime Project / isolation between applications / certificate chain / software platforms / distributed computing client-server application / distributed computing program / software claims / controlled systems / heterogeneous distributed computing environments / computing / network protocols / co-processor / software-level / heterogeneous computing environment / crossplatform portable solutions / be done using various cryptographic protocols / /OrganizationMichael Franz Department / National Science Foundation / U.S. Government / Computer Science University of California Irvine / /PersonMichael Franz / Vivek Haldar / Deepak Chandra / /Positionteller / candidate for an analysis / manager class / security manager / central arbiter / same protocol manager / /ProductKit version 1.4.1 / This solution / Kit 1.4.1 / P2P / /ProgrammingLanguageJava / Java bytecode / /ProvinceOrStateManitoba / /PublishedMediumThe Aegis / /TechnologyVirtual Machine / RAM / peer-to-peer / API / peer-to-peer protocol / P2P / untrusted protocols / private key / P2P protocol / operating system / SSL / operating systems / Gnutella protocol / Ethernet / cryptography / network protocol / particular algorithm / public key / Java / untrusted network protocols / HTTP / peerto-peer protocols / network protocols / signed using the TM’s private key / /SocialTag |