Sciweavers

8655 search results - page 13 / 1731
» Trusted computing challenges
Sort
View
CCS
2009
ACM
14 years 2 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
CRITIS
2007
13 years 9 months ago
An Approach to Trust Management Challenges for Critical Infrastructures
Ioanna Dionysiou, Deborah A. Frincke, David E. Bak...
TDSC
2011
13 years 2 months ago
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
Gang Xu, Cristian Borcea, Liviu Iftode
ICWSM
2009
13 years 5 months ago
Trust Incident Account Model: Preliminary Indicators for Trust Rhetoric and Trust or Distrust in Blogs
This paper defines a concept of trust incident accounts as verbal reports of empirical episodes in which a trustor has reached a state of positive or negative expectations of a tr...
Victoria L. Rubin
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
14 years 1 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox