Sciweavers

1086 search results - page 63 / 218
» Management of trusted citations
Sort
View
DISCEX
2003
IEEE
14 years 4 months ago
Fault-Tolerant Mesh of Trust Applied to DNS Security
The Domain Name System is critical for the proper operation of applications on the Internet. Unfortunately, the DNS has a number of significant security weaknesses that can result...
Wes Griffin, Russ Mundy, Sam Weiler, Dan Massey, N...
CAISE
2006
Springer
14 years 2 months ago
Enhancing trust and buy-in from business: a platform for business -driven development of B2B transactions
A measure for the quality of software is the extent to which it corresponds to the business objectives and requirements it was designed for. The earlier those who elicit the requir...
Michael Schmitt, Bertrand Grégoire, Stefan ...
NOMS
2006
IEEE
14 years 5 months ago
UNIQuE: A User-Centric Framework for Network Identity Management
—Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, rang...
Jörn Altmann, Rajarajan Sampath
ICSE
2003
IEEE-ACM
14 years 11 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
ACSAC
2007
IEEE
14 years 5 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...