Sciweavers

160 search results - page 6 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
126
Voted
WISE
2009
Springer
16 years 24 days ago
Start Trusting Strangers? Bootstrapping and Prediction of Trust
Web-based environments typically span interactions between humans and software services. The management and automatic calculation of trust are among the key challenges of the futur...
Florian Skopik, Daniel Schall, Schahram Dustdar
108
Voted
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
15 years 8 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
154
Voted
ASWEC
2009
IEEE
15 years 1 months ago
From Requirements to Embedded Software - Formalising the Key Steps
Failure of a design to satisfy a system's requirements can result in schedule and cost overruns. When using current approaches, ensuring requirements are satisfied is often d...
Toby Myers, R. Geoff Dromey
144
Voted
SC
2000
ACM
15 years 8 months ago
An Object-Oriented Job Execution Environment
This is a project for developing a distributed job execution environment for highly iterative jobs. An iterative job is one where the same binary code is run hundreds of times wit...
Lance Smith, Rod Fatoohi
124
Voted
ACSAC
2007
IEEE
15 years 10 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist