Sciweavers

1229 search results - page 3 / 246
» Trusted Computing
Sort
View
JHSN
2006
267views more  JHSN 2006»
15 years 2 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
131
Voted
EPIA
2009
Springer
15 years 8 months ago
Computing Confidence Values: Does Trust Dynamics Matter?
Computational Trust and Reputation (CTR) systems are platforms capable of collecting trust information about candidate partners and of computing confidence scores for each one of t...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...
99
Voted
TRUST
2009
Springer
15 years 8 months ago
Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels
Hans Löhr, Ahmad-Reza Sadeghi, Christian St&u...
114
Voted
TRUST
2009
Springer
15 years 8 months ago
Measuring Semantic Integrity for Remote Attestation
Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, ...
116
Voted
ATAL
2008
Springer
15 years 4 months ago
Combining Cognitive with Computational Trust Reasoning
We propose a concept that combines the cognitive with the computational approaches to experience-based trust reasoning. We emphasize that a cognitive component is vital for computa...
Eugen Staab, Thomas Engel