Sciweavers

69 search results - page 1 / 14
» Trusted Storage: Focus on Use Cases
Sort
View
CSREASAM
2006
13 years 6 months ago
Trusted Storage: Focus on Use Cases
This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
Robert Thibadeau, Michael Willett
STORAGESS
2006
ACM
13 years 11 months ago
Limiting trust in the storage stack
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on ...
Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea...
ACSAC
2007
IEEE
13 years 11 months ago
Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting
Special purpose trusted computing devices are currently being deployed to offer many services for which the general purpose computing paradigm is unsuitable. The nature of the ser...
Aggelos Kiayias, Laurent Michel, Alexander Russell...
HICSS
2003
IEEE
138views Biometrics» more  HICSS 2003»
13 years 10 months ago
Can IT Help Government to Restore Public Trust?: Declining Public Trust and Potential Prospects of IT in the Public Sector
During the past four decades, public trust in governments has continued to diminish due to various administrative, political, socio-cultural, economic, and mass media causes. Focu...
M. Jae Moon
CSFW
2009
IEEE
13 years 11 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson