Sciweavers

3299 search results - page 77 / 660
» Privacy and Trusted Computing
Sort
View
121
Voted
CCS
2004
ACM
15 years 8 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
139
Voted
CSFW
2010
IEEE
15 years 6 months ago
A Framework for the Sound Specification of Cryptographic Tasks
Nowadays it is widely accepted to formulate the security of a protocol carrying out a given task via the "trusted-party paradigm," where the protocol execution is compar...
Juan A. Garay, Aggelos Kiayias, Hong-Sheng Zhou
129
Voted
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
15 years 9 months ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
114
Voted
CASCON
2006
85views Education» more  CASCON 2006»
15 years 4 months ago
Trust by design: information requirements for appropriate trust in automation
Trust has, since the early stages of IBM's Autonomic Computing (AC) initiative, been recognized as an important factor in the success of new autonomic features. If operators ...
Pierre P. Duez, Michael Zuliani, Greg A. Jamieson
118
Voted
PERCOM
2006
ACM
16 years 2 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins