Sciweavers

4111 search results - page 55 / 823
» Security, Protocols, and Trust
Sort
View
CCS
2007
ACM
14 years 2 months ago
Trusted computing challenges
Leendert van Doorn
ACSAC
1998
IEEE
14 years 1 months ago
The Solar Trust Model: Authentication Without Limitation
Michael Clifford, C. Lavine, Matt Bishop
DRMTICS
2005
Springer
13 years 10 months ago
TIVA: Trusted Integrity Verification Architecture
Mahadevan Gomathisankaran, Akhilesh Tyagi
IFIP
2009
Springer
14 years 3 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...
BPM
2003
Springer
102views Business» more  BPM 2003»
14 years 2 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory