Sciweavers

8243 search results - page 55 / 1649
» Can We Manage Trust
Sort
View
USS
2008
13 years 10 months ago
Bootstrapping Trust in a "Trusted" Platform
For the last few years, many commodity computers have come equipped with a Trusted Platform Module (TPM). Existing research shows that the TPM can be used to establish trust in th...
Bryan Parno
CSREASAM
2006
13 years 9 months ago
A Framework for the User-Oriented Personal Information Protection
- Thanks to the spread of mobile technologies, we can access to the network anytime and from anywhere. In the near future, we will enable to realize the ubiquitous computing enviro...
Kenichi Takahashi, Kouichi Sakurai
IPCCC
2006
IEEE
14 years 1 months ago
Enabling mobility in enterprise security management
The increasing demand for and the wide adoption of mobile technologies have been witnessed in enterprise information technology (IT) environments in recent years. However, there e...
William Claycomb, Dongwan Shin
CLIMA
2004
13 years 9 months ago
Inferring Trust
In this paper we discuss Liau's logic of Belief, Inform and Trust (BIT), which captures the use of trust to infer beliefs from acquired information. However, the logic does no...
Mehdi Dastani, Andreas Herzig, Joris Hulstijn, Lee...
ENTCS
2007
110views more  ENTCS 2007»
13 years 7 months ago
A Bayesian Model for Event-based Trust
The application scenarios envisioned for ‘global ubiquitous computing’ have unique requirements that are often incompatible with traditional security paradigms. One alternativ...
Mogens Nielsen, Karl Krukow, Vladimiro Sassone