Sciweavers

160 search results - page 9 / 32
» Key Attestation from Trusted Execution Environments
Sort
View
ESAW
2009
Springer
14 years 1 months ago
Determining the Trustworthiness of New Electronic Contracts
Expressing contractual agreements electronically potentially allows agents to automatically perform functions surrounding contract use: establishment, fulfilment, renegotiation et...
Paul T. Groth, Simon Miles, Sanjay Modgil, Nir Ore...
DATE
2007
IEEE
80views Hardware» more  DATE 2007»
14 years 1 months ago
Engineering trust with semantic guardians
The ability to guarantee the functional correctness of digital integrated circuits and, in particular, complex microprocessors, is a key task in the production of secure and trust...
Ilya Wagner, Valeria Bertacco
MOBISEC
2009
Springer
14 years 1 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
ICWS
2007
IEEE
13 years 8 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
JUCS
2010
141views more  JUCS 2010»
13 years 5 months ago
Trust-Oriented Composite Service Selection with QoS Constraints
Abstract: In Service-Oriented Computing (SOC) environments, service clients interact with service providers for consuming services. From the viewpoint of service clients, the trust...
Lei Li, Yan Wang, Ee-Peng Lim