Sciweavers

101 search results - page 2 / 21
» Service Graphs for Building Trust
Sort
View
USENIX
2007
13 years 7 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
EUSAI
2003
Springer
13 years 10 months ago
Interacting in Desktop and Mobile Context: Emotion, Trust, and Task Performance
The Personal Assistant for onLine Services (PALS) project aims at attuning the interaction with mobile services to the momentary usage context. Among other thing, PALS should adequ...
Mark A. Neerincx, Jan Willem Streefkerk
SPW
2004
Springer
13 years 10 months ago
Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with t...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...
JHSN
2006
267views more  JHSN 2006»
13 years 4 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
SEC
2007
13 years 6 months ago
Building a Distributed Semantic-aware Security Architecture
Enhancing the service-oriented architecture paradigm with semantic components is a new field of research and goal of many ongoing projects. The results lead to more powerful web a...
Jan Kolter, Rolf Schillinger, Günther Pernul