Trusted computing allows attesting remote system’s trustworthiness based on the software stack whose integrity has been measured. However, attacker can corrupt
This paper proposes two new algorithms for classifying objects with categorical attributes. These algorithms are derived from the assumption that the attributes