Sciweavers

61 search results - page 2 / 13
» On the Deployment of Mobile Trusted Modules
Sort
View
CISIS
2010
IEEE
14 years 1 days ago
Extending Security-by-Contract with Quantitative Trust on Mobile Devices
Abstract—Security-by-Contract (S×C) is a paradigm providing security assurances for mobile applications. In this work, we present an extension of S×C enriched with an automatic...
Gabriele Costa, Nicola Dragoni, Aliaksandr Lazousk...
CIA
2007
Springer
13 years 11 months ago
Trust Modeling with Context Representation and Generalized Identities
Abstract. We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents...
Martin Rehák, Michal Pechoucek
JUCS
2010
89views more  JUCS 2010»
13 years 3 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
CCS
2009
ACM
13 years 12 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
MA
1999
Springer
133views Communications» more  MA 1999»
13 years 9 months ago
Establishing a Secure Open-Environment for Using Mobile Agents in Electronic Commerce
Although mobile agents are a promising technology, the large-scale deployment of agents and the existence of hosts running agencies will not happen until proper security mechanism...
Paulo Marques, Luís Moura Silva, Joã...