Sciweavers

8655 search results - page 200 / 1731
» Challenges for Trusted Computing
Sort
View
ECAI
2006
Springer
15 years 2 months ago
Computational Opinions
Existing approaches to knowledge representation and reasoning in the context of open systems either deal with "objective" knowledge or with beliefs. In contrast, there ha...
Felix A. Fischer, Matthias Nickles
COMPSAC
2009
IEEE
15 years 5 months ago
Towards Validating Security Protocol Deployment in the Wild
As computing technology becomes increasingly pervasive and interconnected, mobility leads to shorter-lasting relationships between end-points with many different security requirem...
Luca Compagna, Ulrich Flegel, Volkmar Lotz
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 1 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
OSDI
2008
ACM
15 years 11 months ago
Device Driver Safety Through a Reference Validation Mechanism
Device drivers typically execute in supervisor mode and thus must be fully trusted. This paper describes how to move them out of the trusted computing base, by running them withou...
Dan Williams, Emin Gün Sirer, Fred B. Schneid...
SACMAT
2004
ACM
15 years 4 months ago
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the ...
Roberto Tamassia, Danfeng Yao, William H. Winsboro...