Sciweavers

8655 search results - page 236 / 1731
» Challenges for Trusted Computing
Sort
View
ICNP
2009
IEEE
14 years 8 months ago
Quality of Name Resolution in the Domain Name System
The Domain Name System (DNS) is integral to today's Internet. Name resolution for a domain is often dependent on servers well outside the control of the domain's owner. I...
Casey T. Deccio, Chao-Chih Chen, Jeff Sedayao, Kri...
CHI
2003
ACM
15 years 11 months ago
Identity disclosure and the creation of social capital
In this paper, we describe the identity policy decisions for a community network outside of Boston, Massachusetts. To promote trust and accountability, a member's online iden...
David R. Millen, John F. Patterson
PDP
2008
IEEE
15 years 5 months ago
CoDaMine: Communication Data Mining for Feedback and Control in Ubiquitous Environments
In ubiquitous environments an increasing number of sensors capture information on users and an increasing number of actuators present information to users. In this paper we presen...
Tom Gross, Mirko Fetter
IEEEARES
2007
IEEE
15 years 5 months ago
Agent Alliances: A Means for Practical Threshold Signature
In [7] we have proposed a model for the robust and private evaluation of a function within a group of cooperating mobile agents, called an agent Alliance. The model has been given...
Regine Endsuleit, Christoph Amma
IEEESCC
2005
IEEE
15 years 4 months ago
Architectural Support for Automatic Service Composition
We consider architectural properties required for supporting automatic service composition. After defining composable service architecture, we proceed to examine the role of trus...
Nikola Milanovic, Miroslaw Malek