Sciweavers

8655 search results - page 213 / 1731
» Challenges for Trusted Computing
Sort
View
79
Voted
DEXAW
2003
IEEE
98views Database» more  DEXAW 2003»
15 years 4 months ago
Amending P3P for Clearer Privacy Promises
The Platform for Privacy Preferences (P3P) can be a viable tool for organizations to clarify their privacy promises. In this paper, we summarize our experiences and describe some ...
Günter Karjoth, Matthias Schunter, Els Van He...
DISCEX
2003
IEEE
15 years 4 months ago
MYSEA Technology Demonstration
The MYSEA project has produced an innovative architecture and corrresponding engineering prototype consisting of trusted security services and integrated operating system mechanis...
Cynthia E. Irvine, David J. Shifflett, Paul C. Cla...
AMAST
2008
Springer
15 years 27 days ago
A Declarative Debugger for Maude
Abstract. Declarative debugging has been applied to many declarative programming paradigms; in this paper, a declarative debugger for rewriting logic specifications, embodied in th...
Adrián Riesco, Alberto Verdejo, Narciso Mar...
PST
2008
15 years 9 days ago
Encoding the Program Correctness Proofs as Programs in PCC Technology
One of the key issues with the practical applicability of Proof-Carrying Code (PCC) and its related methods is the difficulty in communicating and storing the proofs which are inh...
Heidar Pirzadeh, Danny Dubé
JCP
2007
88views more  JCP 2007»
14 years 10 months ago
Watermarks and Text Transformations in Visual Document Authentication
— Integrity of digital documents is a very important issue if they are to be legally binding. Common solutions, like digital signatures or message authentication codes, are based...
Igor Fischer, Thorsten Herfet