Sciweavers

8655 search results - page 2 / 1731
» Challenges for Trusted Computing
Sort
View
ICSE
2003
IEEE-ACM
14 years 5 months ago
The Grand Challenge of Trusted Components
Reusable components equipped with strict guarantees of quality can help reestablish software development on a stronger footing, by taking advantage of the scaling effect of reuse ...
Bertrand Meyer
ATAL
2004
Springer
13 years 10 months ago
Trust Dynamics: How Trust Is Influenced by Direct Experiences and by Trust Itself
In this paper we will examine two main aspects of trust dynamics: a) How direct experiences involving trust, with their successes or failures, influence the future trust of an age...
Rino Falcone, Cristiano Castelfranchi
DBSEC
2009
163views Database» more  DBSEC 2009»
13 years 6 months ago
A Trust-Based Access Control Model for Pervasive Computing Applications
With the rapid growth in wireless networks and sensor and mobile devices, we are moving towards an era of pervasive computing. Access control is challenging in these environments. ...
Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi ...
P2P
2005
IEEE
106views Communications» more  P2P 2005»
13 years 10 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
SAC
2010
ACM
14 years 2 days ago
T2D: a peer to peer trust management system based on disposition to trust
While the trust paradigm is essential to broadly extend the communication between the environment’s actors, the evaluation of trust becomes a challenge when confronted with init...
Rachid Saadi, Jean-Marc Pierson, Lionel Brunie