Sciweavers

8655 search results - page 14 / 1731
» Trusted computing challenges
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
13 years 2 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
ICDCSW
2007
IEEE
14 years 1 months ago
Building Trust in Online Rating Systems Through Signal Modeling
Abstract— Online feedback-based rating systems are gaining popularity. Dealing with unfair ratings in such systems has been recognized as an important but difficult problem. Thi...
Yafei Yang, Yan Lindsay Sun, Jin Ren, Qing Yang
ITRUST
2005
Springer
14 years 1 months ago
Trust Management Survey
Trust is an important tool in human life, as it enables people to cope with the uncertainty caused by the free will of others. Uncertainty and uncontrollability are also issues in ...
Sini Ruohomaa, Lea Kutvonen
IPPS
2003
IEEE
14 years 23 days ago
Trust Modeling for Peer-to-Peer Based Computing Systems
The peer-to-peer approach to design large-scale systems has significant benefits including scalability, low cost of ownership, robustness, and ability to provide site autonomy. ...
Farag Azzedin, Muthucumaru Maheswaran
SAC
2006
ACM
14 years 1 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland