Sciweavers

361 search results - page 20 / 73
» A Vector Model of Trust for Developing Trustworthy Systems
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
SACMAT
2003
ACM
14 years 1 months ago
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resource...
Adam Hess, Kent E. Seamons
AIM
2002
13 years 8 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
USS
2008
13 years 11 months ago
Bootstrapping Trust in a "Trusted" Platform
For the last few years, many commodity computers have come equipped with a Trusted Platform Module (TPM). Existing research shows that the TPM can be used to establish trust in th...
Bryan Parno
HASE
2007
IEEE
14 years 14 days ago
Precise Documentation of Critical Software
This experience and research based paper discusses the reasons that software cannot be trusted and then explains how the use of greatly improved documentation can make software mo...
David Lorge Parnas, Sergiy A. Vilkomir