Sciweavers

318 search results - page 33 / 64
» Enforcing Trust in Pervasive Computing with Trusted Computin...
Sort
View
PLDI
2010
ACM
14 years 6 months ago
Type-preserving Compilation for End-to-end Verification of Security Enforcement
A number of programming languages use rich type systems to verify security properties of code. Some of these languages are meant for source programming, but programs written in th...
Juan Chen, Ravi Chugh, Nikhil Swamy
WEBI
2004
Springer
14 years 2 months ago
Eliciting Truthful Feedback for Binary Reputation Mechanisms
Reputation mechanisms offer an efficient way of building the necessary level of trust in electronic markets. Feedback about an agent’s past behavior can be aggregated into a me...
Radu Jurca, Boi Faltings
ACSAC
2004
IEEE
14 years 16 days ago
Open-Source Applications of TCPA Hardware
How can Alice trust computation occurring at Bob's computer? Since it exists and is becoming ubiquitous, the current-generation TCPA/TCG hardware might enable a solution. Whe...
John Marchesini, Sean W. Smith, Omen Wild, Joshua ...
ACSAC
2001
IEEE
14 years 13 days ago
Securing Web Servers against Insider Attack
Too often, "security of Web transactions" reduces to "encryption of the channel"--and neglects to address what happens at the server on the other end. This ove...
Shan Jiang, Sean W. Smith, Kazuhiro Minami
GI
2004
Springer
14 years 2 months ago
A Low-Cost Solution for Frequent Symmetric Key Exchange in Ad-hoc Networks
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Markus Volkmer, Sebastian Wallner