Sciweavers

8655 search results - page 212 / 1731
» Challenges for Trusted Computing
Sort
View
CSE
2009
IEEE
15 years 11 months ago
Ceremonies Formal Analysis in PKI's Context
—Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We ta...
Jean Everson Martina, Túlio Cicero Salvaro ...
116
Voted
CCGRID
2007
IEEE
15 years 11 months ago
Executing Large Parameter Sweep Applications on a Multi-VO Testbed
Applications that span multiple virtual organizations (VOs) are of great interest to the eScience community. However, recent attempts to execute large-scale parameter sweep applic...
Shahaan Ayyub, David Abramson, Colin Enticott, Sla...
MDM
2007
Springer
123views Communications» more  MDM 2007»
15 years 11 months ago
Hiding Location Information from Location-Based Services
—In many existing location-based services, a service provider becomes aware of the location of its customers and can, maybe inadvertently, leak this information to unauthorized e...
Urs Hengartner
LCN
2006
IEEE
15 years 11 months ago
Detecting Malicious Peers in Overlay Multicast Streaming
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may ...
Samarth Shetty, Patricio Galdames, Wallapak Tavana...
143
Voted
SAC
2006
ACM
15 years 11 months ago
Trust-enhanced visibility for personalized document recommendations
Documents are recommended by computer-based systems normally according to their prominence in the document reference network. Based on the requirements identified in a concrete u...
Claudia Hess, Klaus Stein, Christoph Schlieder