Sciweavers

1086 search results - page 55 / 218
» Management of trusted citations
Sort
View
AUTONOMICS
2007
ACM
14 years 1 months ago
Trust and punishment
In recent years we have witnessed a great increase in the interest in Trust Management (TM) techniques both from the industrial and the academic sectors. The booming research has ...
Sandro Etalle, Jerry den Hartog, Stephen Marsh
IAT
2010
IEEE
13 years 8 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
SECURWARE
2008
IEEE
14 years 4 months ago
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
—We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the comple...
Frederic Stumpf, Claudia Eckert
EATIS
2009
ACM
14 years 1 months ago
Towards dynamic trust establishment for identity federation
Federation has emerged as a key concept for identity management, as it is the basis to reduce complexity in the companies and improve user experience. However, the problem of esta...
Florina Almenárez Mendoza, Patricia Arias, ...
EUROPKI
2009
Springer
13 years 7 months ago
ABUSE: PKI for Real-World Email Trust
Current PKI-based email systems (such as X.509 S/MIME and PGP/ MIME) potentially enable a recipient to determine a name and organizational affiliation of the sender. This informati...
Chris Masone, Sean W. Smith