Sciweavers

8243 search results - page 61 / 1649
» Can We Manage Trust
Sort
View
NSPW
2004
ACM
14 years 1 months ago
Property-based attestation for computing platforms: caring about properties, not mechanisms
Over the past years, the computing industry has started various initiatives announced to increase computer security by means of new hardware architectures. The most notable effort...
Ahmad-Reza Sadeghi, Christian Stüble
ESORICS
2003
Springer
14 years 27 days ago
Hardware Encapsulation of Security Services
Hardware security modules can be used to encapsulate simple security services that bind security functions such as decryption with authorisation and authentication. Such hardware ...
Adrian Baldwin, Simon Shiu
ACSAC
2001
IEEE
13 years 11 months ago
A Regulated Approach to Certificate Management
Traditionally, creation and revocation of certificates are performed manually, by trusted agents, under conditions that are rarely formalized. This approach to certificate managem...
Victoria Ungureanu
ECAI
2004
Springer
14 years 1 months ago
Finding Social Network for Trust Calculation
Trust is a necessary concept to realize the Semantic Web. But how can we build a “Web of Trust”? We first argue that a small “Web of Trust” for each community is very esse...
Yutaka Matsuo, Hironori Tomobe, Kôiti Hasida...
EH
2005
IEEE
158views Hardware» more  EH 2005»
14 years 1 months ago
Co-evolutionary Variance Can Guide Physical Testing in Evolutionary System Identification
Co-evolution of system models and system tests can be used for exploratory system identification of physical platforms. Here we demonstrate how the amount of physical testing can ...
Viktor Zykov, Josh C. Bongard, Hod Lipson