Sciweavers

8655 search results - page 123 / 1731
» Challenges for Trusted Computing
Sort
View
CCGRID
2006
IEEE
15 years 1 months ago
Evaluating Provenance-based Trust for Scientific Workflows
Provenance is the documentation concerning the origin of a result generated by a process, and provides explanations about who, how, what resources were used in a process, and the ...
Shrija Rajbhandari, Ian Wootten, Ali Shaikh Ali, O...
NSDI
2008
15 years 9 days ago
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff
In this paper we highlight a number of challenges that arise in using crawling to measure the size, topology, and dynamism of distributed botnets. These challenges include traffic...
Chris Kanich, Kirill Levchenko, Brandon Enright, G...
SOSP
2003
ACM
15 years 6 months ago
Implementing an untrusted operating system on trusted hardware
Recently, there has been considerable interest in providing “trusted computing platforms” using hardware — TCPA and Palladium being the most publicly visible examples. In th...
David Lie, Chandramohan A. Thekkath, Mark Horowitz
ICDM
2007
IEEE
101views Data Mining» more  ICDM 2007»
15 years 4 months ago
Lightweight Distributed Trust Propagation
Using mobile devices, such as smart phones, people may create and distribute different types of digital content (e.g., photos, videos). One of the problems is that digital content...
Daniele Quercia, Stephen Hailes, Licia Capra
ATAL
2005
Springer
15 years 3 months ago
A real-world approach to secure and trusted negotiation in MASs
The problem of providing tools to support legally valid negotiations between agents is becoming more and more critical. Agents are supposed to perform crucial tasks autonomously; ...
Roberto Bianchi, Andrea Fontana, Federico Bergenti