Sciweavers

40 search results - page 6 / 8
» A protocol for property-based attestation
Sort
View
SP
2009
IEEE
155views Security Privacy» more  SP 2009»
14 years 4 months ago
A Logic of Secure Systems and its Application to Trusted Computing
We present a logic for reasoning about properties of secure systems. The logic is built around a concurrent programming language with constructs for modeling machines with shared ...
Anupam Datta, Jason Franklin, Deepak Garg, Dilsun ...
DBSEC
2007
104views Database» more  DBSEC 2007»
13 years 11 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng
PCI
2009
Springer
14 years 2 months ago
Query Sensitive Storage for Wireless Sensor Networks
—Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS),...
Alexis Papadimitriou, Dimitrios Katsaros, Yannis M...
IAT
2006
IEEE
14 years 3 months ago
Trust Negotiations with Customizable Anonymity
Trust negotiation makes it possible for two parties to carry on secure transactions by first establishing trust through a bilateral, iterative process of requesting and disclosin...
Anna Cinzia Squicciarini, Abhilasha Bhargav-Spantz...
ISCC
2007
IEEE
164views Communications» more  ISCC 2007»
14 years 4 months ago
DTSN: Distributed Transport for Sensor Networks
: This paper presents the Distributed Transport for Sensor Networks (DTSN), a novel reliable transport protocol for convergecast and unicast communications in Wireless Sensor Netwo...
Bruno Marchi, António Grilo, Mário S...