Kennell, Richard L - 2008
The preservation of physical security for computer systems has long been used as a foundation for computational trust. This requirement has come as a result of the use of shared secrets as host identifiers since there has been no empirical means of ascertaining the trustworthiness of a host in...