Sciweavers

1086 search results - page 46 / 218
» Management of trusted citations
Sort
View
ITRUST
2005
Springer
14 years 3 months ago
Towards an Evaluation Methodology for Computational Trust Systems
Ciarán Bryce, Nathan Dimmock, Karl Krukow, ...
ESAS
2006
Springer
14 years 1 months ago
Cryptographic Protocol to Establish Trusted History of Interactions
In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...
SOSP
2003
ACM
14 years 6 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
IWCMC
2009
ACM
14 years 4 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
SAC
2005
ACM
14 years 3 months ago
Value-oriented design of service coordination processes: correctness and trust
The rapid growth of service coordination languages creates a need for methodological support for coordination design. Coordination design differs from workflow design because a ...
Roel Wieringa, Jaap Gordijn