Sciweavers

8655 search results - page 152 / 1731
» Challenges for Trusted Computing
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
SIGECOM
2003
ACM
128views ECommerce» more  SIGECOM 2003»
15 years 3 months ago
A reputation-based trust model for peer-to-peer ecommerce communities
Peer-to-Peer eCommerce communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such an open community is to us...
Li Xiong, Ling Liu
92
Voted
INTERACT
2007
14 years 11 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...
DATESO
2010
369views Database» more  DATESO 2010»
14 years 8 months ago
Database Trends and Directions: Current Challenges and Opportunities
Database management has undergone more than four decades of evolution producing vast range of research and extensive array of technology solutions. The database research community ...
George Feuerlicht
80
Voted
AINA
2008
IEEE
15 years 4 months ago
Live Network Performance Challenge: FLASH-OFDM vs. HSDPA
HSDPA networks are intensively being deployed to provide mobile broadband connectivity to mobile devices. In addition to HSDPA, FLASH-OFDM is another wireless broadband option ope...
Andres Arjona, Antti Ylä-Jääski, Ju...