Sciweavers

UIC
2009
Springer
14 years 3 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
TRUST
2009
Springer
14 years 3 months ago
Attacking the BitLocker Boot Process
We discuss five attack strategies against BitLocker, which target the way BitLocker is using the TPM sealing mechanism. BitLocker is a disk encryption feature included in some ver...
Sven Türpe, Andreas Poller, Jan Steffan, Jan-...
TRUST
2009
Springer
14 years 3 months ago
Measuring Semantic Integrity for Remote Attestation
Fabrizio Baiardi, Diego Cilea, Daniele Sgandurra, ...
TRUST
2009
Springer
14 years 3 months ago
Remote Attestation of Attribute Updates and Information Flows in a UCON System
UCON is a highly flexible and expressive usage control model which allows an object owner to specify detailed usage control policies to be evaluated on a remote platform. Assuranc...
Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamlee...
TRUST
2009
Springer
14 years 3 months ago
Securing the Dissemination of Emergency Response Data with an Integrated Hardware-Software Architecture
During many crises, access to sensitive emergency-support information is required to save lives and property. For example, for effective evacuations first responders need the name...
Timothy E. Levin, Jeffrey S. Dwoskin, Ganesha Bhas...
TRUST
2009
Springer
14 years 3 months ago
ACPI: Design Principles and Concerns
Abstract. ACPI (Advanced Configuration Power Interface) allows operating systems to efficiently configure the hardware platform they are running on and deal with power management...
Loïc Duflot, Olivier Levillain, Benjamin Mori...
TRUST
2009
Springer
14 years 3 months ago
Secure VPNs for Trusted Computing Environments
Abstract. Virtual Private Networks are a popular mechanism for building complex network infrastructures. Such infrastructures are usually accompanied by strict administrative restr...
Steffen Schulz, Ahmad-Reza Sadeghi
IEEESCC
2009
IEEE
14 years 3 months ago
Service Composition Based on Natural Language Requests
—The easiest way for a user to express his needs regarding a desired service is to use natural language. The main issues come from the fact that the natural language is incomplet...
Marcel Cremene, Jean-Yves Tigli, Stephane Lavirott...
IEEESCC
2009
IEEE
14 years 3 months ago
Managing Faults in the Service Delivery Process of Service Provider Coalitions
In recent years, IT Service Management (ITSM) has become one of the most researched areas of IT. Incident Management and Problem Management form the basis of the tooling provided ...
Patricia Marcu, Larisa Shwartz, Genady Grabarnik, ...