Sciweavers

8243 search results - page 4 / 1649
» Can We Manage Trust
Sort
View
CCS
2007
ACM
14 years 1 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
DEXAW
2003
IEEE
70views Database» more  DEXAW 2003»
14 years 23 days ago
XenoTrust: Event-based distributed trust management
This paper describes XenoTrust, the trust management architecture used in the XenoServer Open Platform: a public infrastructure for wide-area computing, capable of hosting tasks t...
Boris Dragovic, Evangelos Kotsovinos, Steven Hand,...
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 22 days ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
ATAL
2010
Springer
13 years 8 months ago
Can we predict safety culture?
Safety culture is broadly recognized as important for Air Traffic Management and various studies have addressed its characterization and assessment. Nevertheless, relations betwee...
Alexei Sharpanskykh, Sybert H. Stroeve
JCS
2006
118views more  JCS 2006»
13 years 7 months ago
Language based policy analysis in a SPKI Trust Management System
Abstract-- SPKI/SDSI is a standard for issuing authorization and name certificates. SPKI/SDSI can be used to implement a Trust Management System, where the policy for resource acce...
Arun K. Eamani, A. Prasad Sistla