Sciweavers

223 search results - page 2 / 45
» Trusted Hardware: Can It Be Trustworthy
Sort
View
TRUST
2010
Springer
13 years 3 months ago
SegSlice: Towards a New Class of Secure Programming Primitives for Trustworthy Platforms
The TPM is a fairly passive entity. As a result, it can be difficult to involve the TPM in measurements of software trustworthiness beyond simple load-time hashing of static progra...
Sergey Bratus, Michael E. Locasto, Brian Schulte
ICWS
2009
IEEE
14 years 2 months ago
Behavioral Attestation for Business Processes
Service Oriented Architecture (SOA) is an architectural paradigm that enables dynamic composition of heterogeneous, independent, multi-vendor business services. A prerequisite for...
Masoom Alam, Mohammad Nauman, Xinwen Zhang, Tamlee...
ITRUST
2005
Springer
13 years 10 months ago
Can We Manage Trust?
The term trust management suggests that trust can be managed, for example by creating trust, by assessing trustworthiness, or by determining optimal decisions based on specific le...
Audun Jøsang, Claudia Keser, Theodosis Dimi...
NCA
2006
IEEE
13 years 11 months ago
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing
Modern distributed information systems handle increasingly critical data and computation, but there is no systematic way to assess whether a given part of the system can be entrus...
Partha Pratim Pal, Franklin Webber, Michael Atighe...
IFIP
2005
Springer
13 years 10 months ago
Relative Trustworthiness
We present a method for trust scenarios with more than one trustee, where sets of trustees are ordered in a relation of relative trustworthiness. We show how a priority structure i...
Johan W. Klüwer, Arild Waaler