Sciweavers

94 search results - page 4 / 19
» Hardware-rooted trust for secure key management and transien...
Sort
View
EUROPKI
2004
Springer
14 years 1 months ago
Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
The last years have seen a major interest in designing and deploying trust management and public key infrastructures. Yet, it is still far from clear how one can pass from the orga...
Paolo Giorgini, Fabio Massacci, John Mylopoulos, N...
IEEEHPCS
2010
13 years 6 months ago
Security, trust and risk in Digital Rights Management ecosystem
In the last decades, Digital Rights Management (DRM) technology has been laid emphasis on digital contents protection and related security policies, mechanisms and implementation....
Zhiyong Zhang
TISSEC
2002
82views more  TISSEC 2002»
13 years 7 months ago
Trust management for IPsec
IPsec is the standard suite of protocols for networklayer confidentiality and authentication of Internet traffic. The IPsec protocols, however, do not address the policies for how...
Matt Blaze, John Ioannidis, Angelos D. Keromytis
CSE
2009
IEEE
14 years 2 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
ICN
2005
Springer
14 years 1 months ago
Scalable Group Key Management with Partially Trusted Controllers
Abstract. Scalable group key management solutions are crucial for supporting Internet applications that are based on a group communication model. Many solutions have been proposed ...
Himanshu Khurana, Rafael Bonilla, Adam J. Slagell,...