Sciweavers

8655 search results - page 127 / 1731
» Challenges for Trusted Computing
Sort
View
HPCC
2007
Springer
15 years 4 months ago
Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks
In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layerstructure and the choosing of clusterhead...
Qiang Zhang, Guangming Hu, Zhenghu Gong
ICAC
2005
IEEE
15 years 3 months ago
Self-Adjusting Trust and Selection for Web Services
Service-oriented architectures enable services to be dynamically selected and integrated at runtime, thus enabling system flexibility and adaptiveness—autonomic attributes that...
E. Michael Maximilien, Munindar P. Singh
RAID
2001
Springer
15 years 2 months ago
Interfacing Trusted Applications with Intrusion Detection Systems
Abstract. In this paper we describe an interface between intrusion detection systems and trusted system components. The approach presented differs from conventional intrusion dete...
Marc G. Welz, Andrew Hutchison
ICDCS
1996
IEEE
15 years 2 months ago
Making Trust Explicit in Distributed Commerce Transactions
In a distributed environment where nodes are independently motivated, many transactions or commercial exchanges may be stymied due to a lack of trust between the participants. The...
Steven P. Ketchpel, Hector Garcia-Molina
IEEESCC
2010
IEEE
15 years 1 months ago
Analyzing Communities vs. Single Agent-Based Web Services: Trust Perspectives
—Gathering functionally similar agent-based Web services into communities has been proposed and promoted on many occasions. In this paper, we compare the performance of these com...
Babak Khosravifar, Jamal Bentahar, Ahmad Moazin, Z...