Sciweavers

2821 search results - page 99 / 565
» To Trust or Not to Trust
Sort
View
IEEEARES
2010
IEEE
14 years 3 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
DMG
2005
Springer
14 years 2 months ago
Globally Distributed Data
1 International collaborations now manage globally distributed data collections based on the data and trust virtualization mechanisms provided by the Storage Resource Broker data g...
Reagan W. Moore
FORTE
2004
13 years 10 months ago
A Logical Account of NGSCB
Abstract. As its name indicates, NGSCB aims to be the "Next-Generation Secure Computing Base". As envisioned in the context of Trusted Computing initiatives, NGSCB provid...
Martín Abadi, Ted Wobber
TCCI
2010
13 years 7 months ago
A Cross-Cultural Multi-agent Model of Opportunism in Trade
According to transaction cost economics, contracts are always incomplete and offer opportunities to defect. Some level of trust is a sine qua non for trade. If the seller is better...
Gert Jan Hofstede, Catholijn M. Jonker, Tim Verwaa...
SAC
2006
ACM
14 years 2 months ago
STRUDEL: supporting trust in the dynamic establishment of peering coalitions
The Coalition Peering Domain (CPD) is a recent innovation within the field of mesh networking. It facilitates the management of community-area networks in a distributed and scala...
Daniele Quercia, Manish Lad, Stephen Hailes, Licia...