Author of the publication

Management of Integrity-Enforced Virtual Applications.

, , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 138-145. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Toegl, Ronald
add a person with the name Toegl, Ronald
 

Other publications of authors with the same name

Specification and Standardization of a Java Trusted Computing API., , , and . Softw., Pract. Exper., 42 (8): 945-965 (2012)Management of Integrity-Enforced Virtual Applications., , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 138-145. Springer, (2011)A PrivacyCA for Anonymity and Trust., , , and . TRUST, volume 5471 of Lecture Notes in Computer Science, page 101-119. Springer, (2009)Towards Trust Services for Language-Based Virtual Machines for Grid Computing., , , and . TRUST, volume 4968 of Lecture Notes in Computer Science, page 48-59. Springer, (2008)Dynamic Enforcement of Platform Integrity., , and . TRUST, volume 6101 of Lecture Notes in Computer Science, page 265-272. Springer, (2010)Trusted Platform Modules in Cyber-Physical Systems: On the Interference Between Security and Dependability., and . EuroS&P Workshops, page 136-144. IEEE, (2018)Position Paper: A Path Towards Ubiquitous Protection of Media., , and . WASH, volume 1011 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)Lightweight Distributed Heterogeneous Attested Android Clouds., , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 122-141. Springer, (2012)Automatic Error Localization for Software Using Deductive Verification., , and . Haifa Verification Conference, volume 8855 of Lecture Notes in Computer Science, page 92-98. Springer, (2014)An autonomous attestation token to secure mobile agents in disaster response., , and . Security and Communication Networks, 3 (5): 421-438 (2010)