Sciweavers

318 search results - page 1 / 64
» Enforcing Trust in Pervasive Computing with Trusted Computin...
Sort
View
55
Voted
CRITIS
2006
15 years 2 months ago
Enforcing Trust in Pervasive Computing with Trusted Computing Technology
Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
COMPSAC
2006
IEEE
15 years 4 months ago
Application of Fuzzy Logic in Federated Trust Management for Pervasive Computing
In federated and pervasive networks, trust management has become a cornerstone for information security and privacy. Although people have recognized the importance of privacy and ...
Zhengping Wu, Alfred C. Weaver
JHSN
2006
267views more  JHSN 2006»
14 years 10 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
82
Voted
ATAL
2004
Springer
15 years 3 months ago
A Trust Analysis Methodology for Pervasive Computing Systems
Abstract. We present an analysis Trust Analysis Methodology for finding trust issues within pervasive computing systems. It is based on a systematic analysis of scenarios that des...
Stéphane Lo Presti, Michael J. Butler, Mich...
SACMAT
2005
ACM
15 years 4 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang