Sciweavers

255 search results - page 10 / 51
» New Paradigm of Inference Control with Trusted Computing
Sort
View
ASIACRYPT
2007
Springer
14 years 1 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...
FGCS
1992
103views more  FGCS 1992»
13 years 8 months ago
Parallel Inference Machine PIM
: There have been no major control problems during the first three years of the new Tokaido-Sanyo Shinkansen (bullet train) Programmed Route Control (PRC) computer system. Prior to...
Kazuo Taki
TRUST
2009
Springer
14 years 2 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
CHI
2003
ACM
14 years 7 months ago
Containers: a new hierarchical model for browser interfaces
The development of a low bandwidth, high error tolerant neural browser, called the BrainBrowser, has raised new navigational issues. With this paradigm shift of twodimensional spa...
Chad Owens
ISCC
2005
IEEE
132views Communications» more  ISCC 2005»
14 years 1 months ago
A Reputation-Based Trust Mechanism for Ad Hoc Networks
— The main characterisrics of ad hoc networks are the lack of predefined infrastructure and the dynamic topology. These characteristics present some new security vulnerabilities...
Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisale...