Sciweavers

3299 search results - page 70 / 660
» Privacy and Trusted Computing
Sort
View
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 10 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
SPW
2004
Springer
14 years 2 months ago
Privacy Is Linking Permission to Purpose
Abstract Fabio Massacci1 and Nicola Zannone1 Department of Information and Communication Technology University of Trento - Italy {massacci,zannone} at dit.unitn.it The last years h...
Fabio Massacci, Nicola Zannone
ICALP
2009
Springer
14 years 9 months ago
Secure Function Collection with Sublinear Storage
Consider a center possessing a trusted (tamper proof) device that wishes to securely compute a public function over private inputs that are contributed by some network nodes. In ne...
Maged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong...
ICMCS
2005
IEEE
110views Multimedia» more  ICMCS 2005»
14 years 2 months ago
License management scheme with anonymous trust for digital rights management
One of the major issues raised by Digital Rights Management systems concerns the protection of the user’s privacy and anonymous consumption of content. However, most existing li...
Jiang Zhang, Bin Li, Li Zhao, Shi-Qiang Yang
HOTOS
2003
IEEE
14 years 2 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh