Sciweavers

318 search results - page 2 / 64
» Enforcing Trust in Pervasive Computing with Trusted Computin...
Sort
View
ICWS
2007
IEEE
13 years 6 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
CCS
2007
ACM
13 years 11 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
SUTC
2008
IEEE
13 years 11 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
PERVASIVE
2007
Springer
13 years 4 months ago
Rapid Trust Establishment for Pervasive Personal Computing
Ajay Surie, Adrian Perrig, Mahadev Satyanarayanan,...
DBSEC
2007
104views Database» more  DBSEC 2007»
13 years 6 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng