作者: John Zachary , Richard Brooks
关键词:
摘要: Trust management in a networked environment consists of authentication and integrity checking. In mobile computing environment, both remote hosts code are suspect. We present model that addresses trust negotiation between the host simultaneously. Our uses tamper resistant hardware, public key cryptography, one-way hash functions.