Sciweavers

1086 search results - page 46 / 218
» Management of trusted citations
Sort
View
97
Voted
ITRUST
2005
Springer
15 years 10 months ago
Towards an Evaluation Methodology for Computational Trust Systems
Ciarán Bryce, Nathan Dimmock, Karl Krukow, ...
ESAS
2006
Springer
15 years 8 months ago
Cryptographic Protocol to Establish Trusted History of Interactions
In the context of ambient networks, this article describes a cryptographic protocol called Common History Extraction (CHE) protocol implementing a trust management framework. All t...
Samuel Galice, Marine Minier, John Mullins, St&eac...
SOSP
2003
ACM
16 years 1 months ago
Terra: a virtual machine-based platform for trusted computing
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security requirements to run simultaneously on commodity har...
Tal Garfinkel, Ben Pfaff, Jim Chow, Mendel Rosenbl...
IWCMC
2009
ACM
15 years 11 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
SAC
2005
ACM
15 years 10 months ago
Value-oriented design of service coordination processes: correctness and trust
The rapid growth of service coordination languages creates a need for methodological support for coordination design. Coordination design differs from workflow design because a ...
Roel Wieringa, Jaap Gordijn