Sciweavers

1229 search results - page 128 / 246
» Trusted Computing
Sort
View
CHI
2003
ACM
14 years 10 months ago
Identity disclosure and the creation of social capital
In this paper, we describe the identity policy decisions for a community network outside of Boston, Massachusetts. To promote trust and accountability, a member's online iden...
David R. Millen, John F. Patterson
IEEESCC
2005
IEEE
14 years 3 months ago
Architectural Support for Automatic Service Composition
We consider architectural properties required for supporting automatic service composition. After defining composable service architecture, we proceed to examine the role of trus...
Nikola Milanovic, Miroslaw Malek
CASSIS
2004
Springer
14 years 3 months ago
Mobile Resource Guarantees for Smart Devices
We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds. Certificates are attached...
David Aspinall, Stephen Gilmore, Martin Hofmann, D...
PERVASIVE
2004
Springer
14 years 3 months ago
A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
NCA
2003
IEEE
14 years 3 months ago
AdHocFS: Sharing Files in WLANs
This paper presents the ADHOCFS file system for mobile users, which realizes transparent, adaptive file access according to the users’ specific situations (e.g., device in us...
Malika Boulkenafed, Valérie Issarny