Sciweavers

8655 search results - page 150 / 1731
» Challenges for Trusted Computing
Sort
View
108
Voted
SACMAT
2003
ACM
15 years 8 months ago
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
Prasad Naldurg, Roy H. Campbell
116
Voted
CCS
2006
ACM
15 years 6 months ago
Scalable group communication system for scalable trust
Programmers of large-scale trusted systems need tools to simplify tasks such as replicating services or data. Group communication systems achieve this via various flavors of relia...
Krzysztof Ostrowski, Kenneth P. Birman
93
Voted
CSREASAM
2006
15 years 4 months ago
Trusted Storage: Focus on Use Cases
This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
Robert Thibadeau, Michael Willett
107
Voted
CSREASAM
2006
15 years 4 months ago
Stochastic Modeling of Worm Propagation in Trusted Networks
- There are two types of models useful in the study of worm propagation for a given number of terminals in a trusted network i.e. deterministic and stochastic model. The determinis...
Vivek Kumar Sehgal
114
Voted
ENTCS
2006
103views more  ENTCS 2006»
15 years 2 months ago
A WOWA-based Aggregation Technique on Trust Values Connected to Metadata
Metadata produced by members of a diverse community of peers tend to contain low-quality or even mutually inconsistent assertions. Trust values computed on the basis of users'...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...