iX 11/2015
S. 84
Report
Trusted Computing