Sciweavers

1229 search results - page 64 / 246
» Trusted Computing
Sort
View
ICCS
2005
Springer
14 years 4 months ago
Adaptive Model Trust Region Methods for Generalized Eigenvalue Problems
Computing a few eigenpairs of large-scale matrices is a significant problem in science and engineering applications and a very active area of research. In this paper, two methods...
Pierre-Antoine Absil, C. G. Baker, Kyle A. Galliva...
ICAC
2005
IEEE
14 years 4 months ago
Self-Adjusting Trust and Selection for Web Services
Service-oriented architectures enable services to be dynamically selected and integrated at runtime, thus enabling system flexibility and adaptiveness—autonomic attributes that...
E. Michael Maximilien, Munindar P. Singh
RAID
2001
Springer
14 years 3 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
STOC
2004
ACM
117views Algorithms» more  STOC 2004»
14 years 11 months ago
New notions of security: achieving universal composability without trusted setup
We propose a modification to the framework of Universally Composable (UC) security [3]. Our new notion, involves comparing the protocol executions with an ideal execution involvin...
Manoj Prabhakaran, Amit Sahai
SEMCO
2007
IEEE
14 years 5 months ago
A Trust Based Methodology for Web Service Selection
In this paper, we propose a methodology for addressing trust in Semantic Web Services (SWS) based applications. The aim is to enhance the capability-driven selection provided by c...
Stefania Galizia, Alessio Gugliotta, John Domingue