Sciweavers

1229 search results - page 46 / 246
» Trusted Computing
Sort
View
WOWMOM
2006
ACM
119views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Credentials and Beliefs in Remote Trusted Platforms Attestation
— Remote attestation in trusted computing is about the ability of a local platform to authenticate the hardware and the software stack running on a remote trusted platform. We sa...
Andrea Bottoni, Gianluca Dini, Evangelos Kranakis
ICDCSW
2007
IEEE
14 years 2 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato
USS
2004
13 years 9 months ago
Side Effects Are Not Sufficient to Authenticate Software
Kennell and Jamieson [KJ03] recently introduced the Genuinity system for authenticating trusted software on a remote machine without using trusted hardware. Genuinity relies on ma...
Umesh Shankar, Monica Chew, J. D. Tygar
TRUST
2009
Springer
14 years 2 months ago
ACPI: Design Principles and Concerns
Abstract. ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management...
Loïc Duflot, Olivier Levillain, Benjamin Mori...