Return to Article Details Improving Secure Check pointing Recovery Technique using Trusted Nodes Download Download PDF