Sciweavers

989 search results - page 158 / 198
» An information-based model for trust
Sort
View
SOCIALCOM
2010
14 years 8 months ago
Secure Wireless Embedded Systems Via Component-based Design
This paper introduces the method secure-by-design as a way of constructing wireless embedded systems using component-based modeling frameworks. This facilitates design of secure a...
Theis Hjorth, Rune Torbensen
74
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 8 months ago
A DAA Scheme Requiring Less TPM Resources
Abstract. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. One of the most interesti...
Liqun Chen
DEBU
2010
127views more  DEBU 2010»
14 years 8 months ago
Provenance in ORCHESTRA
Sharing structured data today requires agreeing on a standard schema, then mapping and cleaning all of the data to achieve a single queriable mediated instance. However, for setti...
Todd J. Green, Grigoris Karvounarakis, Zachary G. ...
102
Voted
CSFW
2011
IEEE
13 years 10 months ago
Formal Analysis of Protocols Based on TPM State Registers
—We present a Horn-clause-based framework for analysing security protocols that use platform configuration registers (PCRs), which are registers for maintaining state inside the...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
EGOV
2011
Springer
13 years 10 months ago
On the Relevance of Enterprise Architecture and IT Governance for Digital Preservation
Digital Preservation has been recognized as a key challenge in providing trusted information and sustainable eGovernment services. However, there has been little convergence on ali...
Christoph Becker, José Barateiro, Gon&ccedi...