Sciweavers

1229 search results - page 2 / 246
» Trusted Computing
Sort
View
ITIIS
2010
150views more  ITIIS 2010»
13 years 3 months ago
Computational Trust and Its Impact over Rational Purchasing Decisions of Internet Users
As web-based online communities are rapidly growing, the agents in the communities need to know their measurable belief of trust for safe and successful interactions. In this pape...
Sanguk Noh
ICECCS
2005
IEEE
154views Hardware» more  ICECCS 2005»
13 years 10 months ago
Customizable Framework for Managing Trusted Components Deployed on Middleware
Due to the widespread trust threat under the open and dynamic Internet environment, the computer community has endeavored to engage in the studies of technologies for protecting a...
Minghui Zhou, Wenpin Jiao, Hong Mei
SEFM
2003
IEEE
13 years 10 months ago
A Formal Model for Trust in Dynamic Networks
We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a no...
Marco Carbone, Mogens Nielsen, Vladimiro Sassone
EUROPAR
2010
Springer
13 years 5 months ago
cTrust: Trust Aggregation in Cyclic Mobile Ad Hoc Networks
In a Cyclic Mobile Ad Hoc Network (CMANET) where nodes move cyclically, we formulate trust management problems and propose the cTrust scheme to handle trust establishment and aggre...
Huanyu Zhao, Xin Yang, Xiaolin Li
SEC
2004
13 years 6 months ago
Trusted Computing, Trusted Third Parties, and Verified Communications
Trusted Computing gives rise to a new supply of trusted third parties on which distributed systems can potentially rely. They are the secure system components (hardware and softwa...
Martín Abadi