Sciweavers

754 search results - page 18 / 151
» Can self-managed systems be trusted
Sort
View
ACSAC
2005
IEEE
14 years 3 months ago
Countering Trusting Trust through Diverse Double-Compiling
An Air Force evaluation of Multics, and Ken Thompson’s famous Turing award lecture “Reflections on Trusting Trust,” showed that compilers can be subverted to insert maliciou...
David Wheeler
TDSC
2011
13 years 5 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
IDTRUST
2010
ACM
13 years 8 months ago
A proposal for collaborative internet-scale trust infrastructures deployment: the public key system (PKS)
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Massimiliano Pala
WETICE
2000
IEEE
14 years 2 months ago
Walking the Web of Trust
Most currently deployed Public Key Infrastructures (PKIs) are hierarchically oriented and rely on a centralized design. Hierarchical PKIs may be appropriate solutions for many usa...
Germano Caronni
SSS
2009
Springer
14 years 2 months ago
Optimistic Fair Exchange Using Trusted Devices
Efficiency of optimistic fair exchange using trusted devices is studied. Pfitzmann, Schunter and Waidner (PODC 1998) have shown that four messages in the main sub-protocol is op...
Mohammad Torabi Dashti