Sciweavers

582 search results - page 60 / 117
» Security and Privacy Challenges in Cloud Computing Environme...
Sort
View
ISI
2005
Springer
14 years 2 months ago
Performance Study of a Compiler/Hardware Approach to Embedded Systems Security
Abstract. Trusted software execution, prevention of code and data tampering, authentication, and providing a secure environment for software are some of the most important security...
Kripashankar Mohan, Bhagirath Narahari, Rahul Simh...
SRDS
2007
IEEE
14 years 3 months ago
PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations
The increasing complexity and dynamics of grid environments have posed great challenges for secure and privacy-preserving collaboration in a virtual organization. In this paper, w...
Jianxin Li, Jinpeng Huai, Chunming Hu
SPEECH
2010
208views more  SPEECH 2010»
13 years 3 months ago
Silent speech interfaces
The possibility of speech processing in the absence of an intelligible acoustic signal has given rise to the idea of a `silent speech' interface, to be used as an aid for the...
Bruce Denby, Thomas Schultz, Kiyoshi Honda, Thomas...
SUTC
2008
IEEE
14 years 3 months ago
Controlled Disclosure of Context Information across Ubiquitous Computing Domains
One of the challenges in ubiquitous computing is that of mobility, which typically requires interaction between intelligent environments in different domains of administration. We...
Cristian Hesselman, Henk Eertink, Martin Wibbels, ...
CCS
2007
ACM
14 years 27 days ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...