Sciweavers

206 search results - page 5 / 42
» Managing Trust in a Peer-2-Peer Information System
Sort
View
CCS
2007
ACM
14 years 26 days ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
ITRUST
2005
Springer
14 years 5 days ago
Towards an Evaluation Methodology for Computational Trust Systems
Ciarán Bryce, Nathan Dimmock, Karl Krukow, ...
IDTRUST
2009
ACM
14 years 1 months ago
Usable trust anchor management
Security in browsers is based upon users trusting a set of root Certificate Authorities (called Trust Anchors) which they may know little or nothing about. Browser vendors face a...
Massimiliano Pala, Scott A. Rea
WWW
2004
ACM
14 years 7 months ago
Trust-serv: model-driven lifecycle management of trust negotiation policies for web services
A scalable approach to trust negotiation is required in Web service environments that have large and dynamic requester populations. We introduce Trust-Serv, a model-driven trust n...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati
CSFW
2008
IEEE
14 years 1 months ago
A Trust Management Approach for Flexible Policy Management in Security-Typed Languages
Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...