Sciweavers

1229 search results - page 45 / 246
» Trusted Computing
Sort
View
FCSC
2010
92views more  FCSC 2010»
13 years 6 months ago
TRainbow: a new trusted virtual machine based platform
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity...
Yuzhong Sun, Haifeng Fang, Ying Song, Lei Du, Kai ...
CHI
2006
ACM
14 years 8 months ago
Reinventing trust, collaboration and compliance in social systems
The objective of this paper is to set the research agenda for a workshop focusing on novel approaches to supporting trust, collaboration, and compliance in social systems. Suggest...
Jens Riegelsberger, Asimina Vasalou, Philip Bonhar...
PERCOM
2004
ACM
14 years 7 months ago
Untraceable Secret Credentials: Trust Establishment with Privacy
There is generally no a priori trust relationship among entities interacting in pervasive computing environments which makes it necessary to establish trust from scratch. This tas...
Laurent Bussard, Yves Roudier, Refik Molva
IJWIS
2007
153views more  IJWIS 2007»
13 years 7 months ago
A security framework for agent-based systems
Purpose – This paper aims to address some security issues in open systems such as service-oriented applications and grid computing. It proposes a security framework for these sy...
Jamal Bentahar, Francesca Toni, John-Jules Ch. Mey...
ITRUST
2005
Springer
14 years 1 months ago
Experience-Based Trust: Enabling Effective Resource Selection in a Grid Environment
The Grid vision is to allow heterogeneous computational resources to be shared and utilised globally. Grid users are able to submit tasks to remote resources for execution. Howeve...
Nathan Griffiths, Kuo-Ming Chao