Sciweavers

8655 search results - page 149 / 1731
» Challenges for Trusted Computing
Sort
View
COMPUTER
2000
180views more  COMPUTER 2000»
14 years 10 months ago
The Challenges of Automatic Summarization
tion--the art of abstracting key content from one or more information sources--has become an integral part of everyday life. People keep abreast of world affairs by listening to ne...
Udo Hahn, Inderjeet Mani
WCNC
2008
IEEE
15 years 4 months ago
On the Deployment of Mobile Trusted Modules
— In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpo...
Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper
COLCOM
2007
IEEE
15 years 4 months ago
Secure peer-to-peer networks for trusted collaboration
Abstract—An overview of recent advances in secure peerto-peer networking is presented, toward enforcing data integrity, confidentiality, availability, and access control policie...
Kevin W. Hamlen, Bhavani M. Thuraisingham
71
Voted
ISPA
2005
Springer
15 years 3 months ago
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Abstract. Reputation systems help peers decide whom to trust before undertaking a transaction. Conventional approaches to reputation-based trust modeling assume that peers reputed ...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
IFIP
2004
Springer
15 years 3 months ago
An Interactive Trust Management and Negotiation Scheme
Interactive access control allows a server to compute and communicate on the fly the missing credentials to a client and to adapt its responses on the basis of presented and decli...
Hristo Koshutanski, Fabio Massacci