Sciweavers

1229 search results - page 27 / 246
» Trusted Computing
Sort
View
SIGOPSE
2004
ACM
14 years 1 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn
TMC
2010
109views more  TMC 2010»
13 years 6 months ago
Uncertainty Modeling and Reduction in MANETs
—Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right or wrong...
Feng Li, Jie Wu
DBISP2P
2003
Springer
76views Database» more  DBISP2P 2003»
14 years 26 days ago
Trust-Aware Delivery of Composite Goods
Abstract. The vast majority of the interactions in typical online communities nowadays is between complete strangers. In such settings reputation reporting and trust management mod...
Magdalena Punceva, Karl Aberer
IAT
2007
IEEE
14 years 2 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
ICPADS
2007
IEEE
14 years 1 months ago
Statistical trust establishment in wireless sensor networks
Abstract— We present a new distributed approach that establishes reputation-based trust among sensor nodes in order to identify malfunctioning and malicious sensor nodes and mini...
Matthew J. Probst, Sneha Kumar Kasera