Sciweavers

3299 search results - page 37 / 660
» Privacy and Trusted Computing
Sort
View
ISI
2006
Springer
13 years 8 months ago
A Trust Model for Uncertain Interactions in Ubiquitous Environments
Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei...
SP
2010
IEEE
179views Security Privacy» more  SP 2010»
13 years 7 months ago
TrustVisor: Efficient TCB Reduction and Attestation
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zh...
SEFM
2003
IEEE
14 years 1 months ago
A Formal Model for Trust in Dynamic Networks
We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a no...
Marco Carbone, Mogens Nielsen, Vladimiro Sassone
CCS
2007
ACM
14 years 20 days ago
Offline untrusted storage with immediate detection of forking and replay attacks
We address the problem of using an untrusted server with only a trusted timestamping device (TTD) to provide trusted storage for a large number of clients, where each client may o...
Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarme...
IJNSEC
2006
71views more  IJNSEC 2006»
13 years 8 months ago
Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
Zhong et al. formulated the problem of disclosing credentials (associated with privacy) for building trust in an open environment like Internet. Thus, one form of privacy-trust pr...
Rama Murthy Garimella