Sciweavers

334 search results - page 31 / 67
» trust 2010
Sort
View
CMS
2003
120views Communications» more  CMS 2003»
13 years 11 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
ENTCS
2007
100views more  ENTCS 2007»
13 years 9 months ago
Lightweight Static Capabilities
We describe a modular programming style that harnesses modern type systems to verify safety conditions in practical systems. This style has three ingredients: (i) A compact kernel...
Oleg Kiselyov, Chung-chieh Shan
IOT
2010
13 years 7 months ago
my2cents - Digitizing consumer opinions and comments about retail products
Consumers seek for trusted advice during buying decision. Brand owners and retailers invest large sums in marketing and market research, trying hard to find out what customers real...
Stephan Karpischek, Florian Michahelles
TRUST
2010
Springer
14 years 2 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
TRUST
2010
Springer
13 years 8 months ago
The PUF Promise
Physical Uncloneable Functions (PUF) are systems whose physical behavior to different inputs can be measured reliably, yet cannot be cloned in a physical replica. Existing designs ...
Heike Busch, Miroslava Sotáková, Ste...