Sciweavers

1229 search results - page 14 / 246
» Trusted Computing
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Composition Trust Bindings in Pervasive Computing Service Composition
In pervasive computing, devices or peers may implement or compose services using services from other devices or peers, and may use components from various sources. A composition t...
John Buford, Rakesh Kumar, Greg Perkins
IWSAS
2001
Springer
14 years 1 days ago
Exercising Qualitative Control in Autonomous Adaptive Survivable Systems
We seek to construct autonomous adaptive survivable systems that use active trust management to adapt their own behavior in the face of compromises in the computational environment...
Jon Doyle, Michael McGeachie
PODC
2003
ACM
14 years 26 days ago
Cryptography and competition policy: issues with 'trusted computing'
The most significant strategic development in information technology over the past year has been ‘trusted computing’. This is popularly associated with Microsoft’s ‘Pallad...
Ross J. Anderson
IPPS
2006
IEEE
14 years 1 months ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang
IMCSIT
2010
13 years 5 months ago
Selected Security Aspects of Agent-based Computing
The paper presents selected security aspects related to confidentiality, privacy, trust and authenticity issues of a distributed, agent-based computing. Particular attention has be...
Mariusz R. Matuszek, Piotr Szpryngier