This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on ...
Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea...
Special purpose trusted computing devices are currently being deployed to offer many services for which the general purpose computing paradigm is unsuitable. The nature of the ser...
Aggelos Kiayias, Laurent Michel, Alexander Russell...
During the past four decades, public trust in governments has continued to diminish due to various administrative, political, socio-cultural, economic, and mass media causes. Focu...
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...