<s>
A	O
Secure	B-Protocol
End	I-Protocol
Node	I-Protocol
is	O
a	O
trusted	O
,	O
individual	O
computer	O
that	O
temporarily	O
becomes	O
part	O
of	O
a	O
trusted	O
,	O
sensitive	O
,	O
well-managed	O
network	O
and	O
later	O
connects	O
to	O
many	O
other	O
(	O
un	O
)	O
trusted	O
networks/clouds	O
.	O
</s>
<s>
The	O
remote	O
,	O
private	O
,	O
and	O
secure	O
network	O
might	O
be	O
organization	O
's	O
in-house	O
network	O
or	O
a	O
cloud	B-Architecture
service	I-Architecture
.	O
</s>
<s>
A	O
Secure	B-Protocol
End	I-Protocol
Node	I-Protocol
typically	O
involves	O
authentication	O
of	O
(	O
i.e.	O
</s>
<s>
A	O
Secure	B-Protocol
End	I-Protocol
Node	I-Protocol
solves/mitigates	O
end	O
node	O
problem	O
.	O
</s>
<s>
Another	O
example	O
is	O
a	O
non-persistent	O
,	O
remote	O
client	B-Protocol
that	O
boots	O
over	O
the	O
network	O
.	O
</s>
<s>
A	O
less	O
secure	O
but	O
very	O
low	O
cost	O
approach	O
is	O
to	O
trust	O
any	O
hardware	O
(	O
corporate	O
,	O
government	O
,	O
personal	O
,	O
or	O
public	O
)	O
but	O
restrict	O
user	O
and	O
network	O
access	O
to	O
a	O
known	O
kernel	B-Operating_System
(	O
computing	O
)	O
and	O
higher	O
software	O
.	O
</s>
<s>
An	O
implementation	O
of	O
this	O
is	O
a	O
Linux	B-Application
Live	O
CD	O
that	O
creates	O
a	O
stateless	B-Application
,	O
non-persistent	O
client	B-Protocol
,	O
for	O
example	O
Lightweight	O
Portable	O
Security	O
.	O
</s>
