Retrofitting and developing applications for a trusted computing base | IEEE Conference Publication | IEEE Xplore