Sciweavers

1120 search results - page 92 / 224
» Trust in Electronic Environments
Sort
View
JTAER
2010
135views more  JTAER 2010»
13 years 8 months ago
Developing Trust In Virtual Software Development Teams
Today globally distributed software development has become the norm for many organizations and the popularity of implementing such an approach continues to increase. In these circ...
Valentine Casey
CCS
2007
ACM
14 years 4 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
SWS
2004
ACM
14 years 3 months ago
Trust but verify: authorization for web services
Through web service technology, distributed applications can be built in a exible manner, bringing tremendous power to applications on the web. However, this exibility poses sig...
Christian Skalka, Xiaoyang Sean Wang
CCS
2008
ACM
14 years 12 days ago
Flexible and secure enterprise rights management based on trusted virtual domains
The requirements for secure document workflows in enterprises become increasingly sophisticated, with employees performing different tasks under different roles using the same pro...
Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, ...
HPDC
2010
IEEE
13 years 11 months ago
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Data is routinely created, disseminated, and processed in distributed systems that span multiple administrative domains. To maintain accountability while the data is transformed b...
Ashish Gehani, Minyoung Kim