Sciweavers

8655 search results - page 394 / 1731
» Challenges for Trusted Computing
Sort
View
106
Voted
PERCOM
2005
ACM
16 years 3 months ago
Secure context-sensitive authorization
There is a recent trend toward rule-based authorization systems to achieve flexible security policies. Also, new sensing technologies in pervasive computing make it possible to de...
Kazuhiro Minami, David Kotz
135
Voted
APSCC
2009
IEEE
15 years 10 months ago
Selecting Web services based on past user experiences
Since the Internet of Services (IoS) is becoming reality, there is an inherent need for novel service selection mechanisms, which work in spite of large numbers of alternative ser...
Philipp Leitner, Anton Michlmayr, Florian Rosenber...
CSE
2009
IEEE
15 years 10 months ago
Davis Social Links or: How I Learned to Stop Worrying and Love the Net
—When the Internet was conceived, its fundamental operation was envisioned to be point-to-point communication allowing anybody to talk directly to anybody. With its increasing su...
Matt Spear, Xiaoming Lu, Shyhtsun Felix Wu
112
Voted
DSN
2009
IEEE
15 years 10 months ago
Fail-Aware Untrusted Storage
We consider a set of clients collaborating through an online service provider that is subject to attacks, and hence y trusted by the clients. We introduce the abstraction of a fai...
Christian Cachin, Idit Keidar, Alexander Shraer
133
Voted
APNOMS
2009
Springer
15 years 10 months ago
IP Prefix Hijacking Detection Using Idle Scan
The Internet is comprised of a lot of interconnected networks communicating reachability information using BGP. Due to the design based on trust between networks, IP prefix hijacki...
Seong-Cheol Hong, Hong-Taek Ju, James W. Hong