Sciweavers

8655 search results - page 204 / 1731
» Challenges for Trusted Computing
Sort
View
SEMWEB
2009
Springer
15 years 3 months ago
Semantic Provenance for Science Data Products: Application to Image Data Processing
—A challenge in providing scientific data services to a broad user base is to also provide the metadata services and tools the user base needs to correctly interpret and trust t...
Stephan Zednik, Peter Fox, Deborah L. McGuinness, ...
IJCSA
2008
131views more  IJCSA 2008»
14 years 10 months ago
On Ubiquitous Integrated Computing
: Ubiquitous integrated computing makes possible new workflow processes and business models which can meet the challenges from the fast growing digital convergence. An integrated i...
Kari Anne Haaland Thorsen, Chunming Rong
TRUSTBUS
2007
Springer
15 years 4 months ago
Usage Control in Service-Oriented Architectures
Usage control governs the handling of sensitive data after it has been given away. The enforcement of usage control requirements is a challenge because the service requester in gen...
Alexander Pretschner, Fabio Massacci, Manuel Hilty
INFOCOM
2006
IEEE
15 years 4 months ago
A Secure Triple-Key Management Scheme for Wireless Sensor Networks
– Key management is critical to meet the security goals [1] to prevent the Sensor Networks being compromised by an adversary. Due to ad-hoc nature and resource limitations of sen...
Tanveer Zia, Albert Y. Zomaya
ECSA
2008
Springer
15 years 15 days ago
A Security Model for Internet-Based Digital Asset Management Systems
Abstract. Usage and exploitation of the Internet is a critical requirement for managing and distributing valuable digital assets. This requirement introduces a great number of thre...
Ioannis Chatzigiannakis, Vasiliki Liagkou, D. Salo...