Sciweavers

94 search results - page 9 / 19
» Principles of remote attestation
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
Bonsai: Balanced Lineage Authentication
The provenance of a piece of data is of utility to a wide range of applications. Its availability can be drastically increased by automatically collecting lineage information duri...
Ashish Gehani, Ulf Lindqvist
IH
2004
Springer
14 years 25 days ago
An Asymmetric Security Mechanism for Navigation Signals
Abstract. Existing navigation services, such as GPS, offer no signalintegrity (anti-spoof) protection for the general public, especially not with systems for remote attestation of...
Markus G. Kuhn
TRUST
2009
Springer
14 years 2 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
SACMAT
2006
ACM
14 years 1 months ago
PRIMA: policy-reduced integrity measurement architecture
We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availabi...
Trent Jaeger, Reiner Sailer, Umesh Shankar
AI
1998
Springer
13 years 7 months ago
Remote Agent: To Boldly Go Where No AI System Has Gone Before
Renewed motives for space exploration have inspired NASA to work toward the goal of establishing a virtual presence in space, through heterogeneous eets of robotic explorers. Info...
Nicola Muscettola, P. Pandurang Nayak, Barney Pell...