Sciweavers

1229 search results - page 26 / 246
» Trusted Computing
Sort
View
IJAR
2007
104views more  IJAR 2007»
13 years 7 months ago
On representation and aggregation of social evaluations in computational trust and reputation models
Interest for computational trust and reputation models is on the rise. One of the most important aspects of these models is how they deal with information received from other indi...
Jordi Sabater-Mir, Mario Paolucci
INFOCOM
2008
IEEE
14 years 2 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
PUC
2000
70views more  PUC 2000»
13 years 7 months ago
Mobile Computers in a Community NHS Trust: Is this a Relevant Context and Environment for their Use?
This paper describes a case study in which mobile computers were used by a UK NHS Trust. The intention was to give clinicians access to up to date patient data enabling them to be...
Barbara McManus
WPES
2005
ACM
14 years 1 months ago
Privacy for RFID through trusted computing
Radio Frequency Identification (RFID) technology raises significant privacy issues because it enables tracking of items and people possibly without their knowledge or consent. O...
David Molnar, Andrea Soppera, David Wagner
CCS
2006
ACM
13 years 11 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang