Sciweavers

1331 search results - page 8 / 267
» Trusted Mobile Platforms
Sort
View
JHSN
2006
267views more  JHSN 2006»
13 years 7 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
WOWMOM
2006
ACM
119views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
Credentials and Beliefs in Remote Trusted Platforms Attestation
— Remote attestation in trusted computing is about the ability of a local platform to authenticate the hardware and the software stack running on a remote trusted platform. We sa...
Andrea Bottoni, Gianluca Dini, Evangelos Kranakis
DEXAW
2003
IEEE
70views Database» more  DEXAW 2003»
14 years 23 days ago
XenoTrust: Event-based distributed trust management
This paper describes XenoTrust, the trust management architecture used in the XenoServer Open Platform: a public infrastructure for wide-area computing, capable of hosting tasks t...
Boris Dragovic, Evangelos Kotsovinos, Steven Hand,...
SRDS
2006
IEEE
14 years 1 months ago
Satem: Trusted Service Code Execution across Transactions
Web services and service oriented architectures are becoming the de facto standard for Internet computing. A main problem faced by users of such services is how to ensure that the...
Gang Xu, Cristian Borcea, Liviu Iftode
SAC
2006
ACM
14 years 1 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland