Sciweavers

177 search results - page 13 / 36
» Trusted Computing, Trusted Third Parties, and Verified Commu...
Sort
View
EUC
2007
Springer
14 years 1 months ago
Obligations for Privacy and Confidentiality in Distributed Transactions
Existing access control systems are typically unilateral in that the enterprise service provider assigns the access rights and makes the access control decisions, and there is no n...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
CCGRID
2007
IEEE
14 years 2 months ago
Executing Large Parameter Sweep Applications on a Multi-VO Testbed
Applications that span multiple virtual organizations (VOs) are of great interest to the eScience community. However, recent attempts to execute large-scale parameter sweep applic...
Shahaan Ayyub, David Abramson, Colin Enticott, Sla...
CSE
2009
IEEE
13 years 11 months ago
Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems
Abstract--Much of modern software development consists of assembling together existing software components and writing the glue code that integrates them into a unified application...
Eugen Leontie, Gedare Bloom, Bhagirath Narahari, R...
CISIS
2009
IEEE
14 years 2 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
ACSAC
2007
IEEE
14 years 2 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...