Sciweavers

1120 search results - page 116 / 224
» Trust in Electronic Environments
Sort
View
WISA
2007
Springer
14 years 4 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
CORR
2008
Springer
143views Education» more  CORR 2008»
13 years 10 months ago
A Type System for Data-Flow Integrity on Windows Vista
The Windows Vista operating system implements an interesting model of multi-level integrity. We observe that in this model, trusted code must participate in any information-flow a...
Avik Chaudhuri, Prasad Naldurg, Sriram K. Rajamani
ETS
2002
IEEE
153views Hardware» more  ETS 2002»
13 years 10 months ago
Overcoming Social and Psychological Barriers to Effective On-line Collaboration
Research suggests that collaboration in an on-line course can enhance learning, reduce feelings of isolation, increase satisfaction with the course, and increase motivation. Unfor...
Sandra C. Hughes, Leah Wickersham, David L. Ryan-J...
WWW
2003
ACM
14 years 11 months ago
The Eigentrust algorithm for reputation management in P2P networks
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, o...
Sepandar D. Kamvar, Mario T. Schlosser, Hector Gar...
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
14 years 4 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...