Sciweavers

1022 search results - page 17 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
PERCOM
2009
ACM
14 years 8 months ago
DTT: A Distributed Trust Toolkit for Pervasive Systems
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around dis...
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska...
CHI
2010
ACM
14 years 2 months ago
The effect of eco-driving system towards sustainable driving behavior
In this paper, we explore the use of an Eco-Driving System [1] to see how the system promotes greener driving behavior. We conducted both an online survey (N=60) and a user test (...
Heewon Lee, Woohun Lee, Youn-Kyung Lim
DAC
2011
ACM
12 years 7 months ago
TPM-SIM: a framework for performance evaluation of trusted platform modules
This paper presents a simulation toolset for estimating the impact of Trusted Platform Modules (TPMs) on the performance of applications that use TPM services, especially in multi...
Jared Schmitz, Jason Loew, Jesse Elwell, Dmitry Po...
DATE
2007
IEEE
73views Hardware» more  DATE 2007»
14 years 2 months ago
Design methods for security and trust
The design of ubiquitous and embedded computers focuses on cost factors such as area, power-consumption, and performance. Security and trust properties, on the other hand, are oft...
Ingrid Verbauwhede, Patrick Schaumont
SRDS
2006
IEEE
14 years 1 months ago
Satem: Trusted Service Code Execution across Transactions
Web services and service oriented architectures are becoming the de facto standard for Internet computing. A main problem faced by users of such services is how to ensure that the...
Gang Xu, Cristian Borcea, Liviu Iftode