Sciweavers

1117 search results - page 36 / 224
» A Compliance Model of Trust
Sort
View
ECRTS
2005
IEEE
15 years 7 months ago
Automated Model-Based Generation of Ravenscar-Compliant Source Code
Graphical languages of various sorts are increasingly used for the specification and the design of high-integrity real-time systems. Their coverage however does not extend with a...
Matteo Bordin, Tullio Vardanega
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
15 years 8 months ago
Does Interpersonal Trust Also Matter? Exploring the Role of Trust in Successful IT Outsourcing
Recently, the focus of IT outsourcing has been shifting from the “what” and “why” issues to “how” companies manage outsourcing process, during which the relationship m...
Qi Cong, Patrick Y. K. Chau
USS
2008
15 years 4 months ago
Bootstrapping Trust in a "Trusted" Platform
For the last few years, many commodity computers have come equipped with a Trusted Platform Module (TPM). Existing research shows that the TPM can be used to establish trust in th...
Bryan Parno
SAC
2006
ACM
15 years 7 months ago
The advent of trusted computing: implications for digital forensics
The release of computer hardware devices based on “trusted computing” technologies is heralding a paradigm shift that will have profound implications for digital forensics. In...
Mike Burmester, Judie Mulholland
SAC
2009
ACM
15 years 8 months ago
Secure web-based retrieval of documents with usage controls
Usage controls enable the provider of some information to limit how recipients may use it. Usage controls may be desirable in enterprise environments, e.g., for regulatory complia...
Peter Djalaliev, José Carlos Brustoloni