Sciweavers

1229 search results - page 48 / 246
» Trusted Computing
Sort
View
92
Voted
NDSS
1998
IEEE
15 years 6 months ago
Trust Management and Internet Client Security
Blair Dillaway
144
Voted
CHI
2004
ACM
15 years 7 months ago
Trust and mistrust of online health sites
Do different design and information content factors influence trust and mistrust of online health sites? Fifteen women faced with a risky health decision were observed while searc...
Elizabeth Sillence, Pamela Briggs, Lesley Fishwick...
122
Voted
TRUST
2009
Springer
15 years 8 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
140
Voted
EUROPAR
2008
Springer
15 years 4 months ago
Building Secure Resources to Ensure Safe Computations in Distributed and Potentially Corrupted Environments
Abstract. Security and fault-tolerance is a big issue for intensive parallel computing in pervasive environments with hardware errors or malicious acts that may alter the result. I...
Sébastien Varrette, Jean-Louis Roch, Guilla...
95
Voted
ACMSE
2004
ACM
15 years 7 months ago
Trustworthiness in e-commerce
Usability has often been sold as the silver bullet for solving the problems of unprofitable online stores. Although better usability will generally improve these sites and their p...
Patricia Lanford, Roland Hübscher