Sciweavers

4111 search results - page 165 / 823
» Security, Protocols, and Trust
Sort
View
ETRICS
2006
14 years 2 months ago
Transitive Trust in Mobile Scenarios
rorizontl integrtion of ess tehnologies to networks nd servies should e ompnied y some kind of onvergene of uthentiE tion tehnologiesF he missing link for the federtion of user ide...
Nicolai Kuntze, Andreas U. Schmidt
LATINCRYPT
2010
13 years 8 months ago
Broadcast Encryption with Multiple Trust Authorities
Abstract. In this paper we extend the notion of hierarchical identitybased encryption with wildcards (WIBE) from the domain of a single Trusted Authority (TA) to a setting with mul...
Kent D. Boklan, Alexander W. Dent, Christopher A. ...
GLOBECOM
2006
IEEE
14 years 4 months ago
On the Feasibility of Very Low Complexity Trust Modules Using PKPS Synergies
Abstract— For many evolving application scenarios like ubiquitous and autonomic computing systems, trustworthy computing solutions are essential. However the fact that the autono...
Mahalingam Ramkumar
CAISE
2007
Springer
14 years 4 months ago
Achieving trust in IT outsourcing relationships
IT outsourcing is a viable option for organizations to maintain competitiveness and get the ability to focus on core competences. However, there are risks, such as handing over sen...
Eva Söderström, Christian Lennerholt
TRUSTBUS
2004
Springer
14 years 3 months ago
Dynamically Changing Trust Structure in Capability Based Access Control Systems
The functioning of modern IT-systems with autonomously acting components requires an elaborate access control system in which each participant can maintain her own trust structure....
Sandra Wortmann, Barbara Sprick, Christoph Kobusch