Sciweavers

8655 search results - page 36 / 1731
» Challenges for Trusted Computing
Sort
View
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
14 years 20 days ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
IEEEARES
2010
IEEE
14 years 3 months ago
External Insider Threat: A Real Security Challenge in Enterprise Value Webs
—Increasingly, organizations collaborate with other organizations in value webs with various arrangements, such as outsourcing, partnering, joint ventures, or subcontracting. As ...
Virginia N. L. Franqueira, André van Cleeff...
CNSR
2006
IEEE
14 years 2 months ago
Trusted Computing for Protecting Ad-hoc Routing
Ad-hoc networks rely on participation and cooperation of nodes within the network to transmit data to destinations. However, in networks where participating nodes are controlled b...
Michael Jarrett, Paul Ward
PUC
2000
70views more  PUC 2000»
13 years 8 months ago
Mobile Computers in a Community NHS Trust: Is this a Relevant Context and Environment for their Use?
This paper describes a case study in which mobile computers were used by a UK NHS Trust. The intention was to give clinicians access to up to date patient data enabling them to be...
Barbara McManus
IAT
2007
IEEE
14 years 3 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...