Sciweavers

1229 search results - page 15 / 246
» Trusted Computing
Sort
View
ATC
2007
Springer
14 years 1 months ago
An Approach to a Trustworthy System Architecture Using Virtualization
We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group ...
Frederic Stumpf, Michael Benz, Martin Hermanowski,...
ATAL
2011
Springer
12 years 7 months ago
Trust as dependence: a logical approach
We propose that the trust an agent places in another agent declaratively captures an architectural connector between the two agents. We formulate trust as a generic modality expre...
Munindar P. Singh
CCGRID
2002
IEEE
14 years 18 days ago
Towards Trust-Aware Resource Management in Grid Computing Systems
Resource management is a central part of a Grid computing system. In a large-scale wide-area system such as the Grid, security is a prime concern. One approach is to be conservati...
Farag Azzedin, Muthucumaru Maheswaran
WSPI
2008
13 years 9 months ago
Possibilities and Limitations of Modeling Trust and Reputation
Abstract. We all highly depend and rely on the trustworthiness of information and services provided by various parties and institutions. Reputation systems are one possibility to s...
Andreas Gutscher, Jessica Heesen, Oliver Siemoneit
WS
2004
ACM
14 years 1 months ago
Trust evaluation in ad-hoc networks
Title of Thesis: DISTRIBUTED TRUST EVALUATION IN AD-HOC NETWORKS Georgios E. Theodorakopoulos, Master of Science, 2004 Thesis directed by: Professor John S. Baras Department of El...
George Theodorakopoulos, John S. Baras