Sciweavers

8655 search results - page 5 / 1731
» Challenges for Trusted Computing
Sort
View
P2P
2003
IEEE
157views Communications» more  P2P 2003»
14 years 22 days ago
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
Decentralized Peer to Peer (P2P) networks offer both opportunities and threats. Its open and decentralized nature makes it extremely susceptible to malicious users spreading harmf...
Aameek Singh, Ling Liu
WISE
2009
Springer
14 years 4 months ago
Start Trusting Strangers? Bootstrapping and Prediction of Trust
Web-based environments typically span interactions between humans and software services. The management and automatic calculation of trust are among the key challenges of the futur...
Florian Skopik, Daniel Schall, Schahram Dustdar
CHI
2004
ACM
14 years 7 months ago
How to trust robots further than we can throw them
Panelists with backgrounds in diverse aspects of humanrobot interaction will discuss the challenges of human-robot interaction in terms of operator trust. The panel will showcase ...
David J. Bruemmer, Douglas A. Few, Michael A. Good...
CCS
2007
ACM
13 years 11 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...
IDTRUST
2009
ACM
14 years 2 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta