Sciweavers

376 search results - page 63 / 76
» Integrating Trust in Grid Computing Systems
Sort
View
ICSE
2004
IEEE-ACM
15 years 9 months ago
The Role of Agreements in IT Management Software
Various forms of agreements naturally arise in the service provider model as well as in multi-party computing models such as business-to-business, utility and grid computing. The r...
Aad P. A. van Moorsel, Carlos Molina-Jiméne...
CADE
1998
Springer
15 years 1 months ago
System Description: card TAP: The First Theorem Prover on a Smart Card
Abstract. We present the first implementation of a theorem prover running on a smart card. The prover is written in Java and implements a dual tableau calculus. Due to the limited ...
Rajeev Goré, Joachim Posegga, Andrew Slater...
80
Voted
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 1 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan
ATC
2007
Springer
15 years 3 months ago
Building Autonomic and Secure Service Oriented Architectures with MAWeS
Service-oriented architectures (SOA) and, in particular, Web Services designs are currently widely used for the development of open, large-scale interoperable systems. In those sys...
Valentina Casola, Emilio Pasquale Mancini, Nicola ...
CHES
2006
Springer
179views Cryptology» more  CHES 2006»
15 years 1 months ago
Offline Hardware/Software Authentication for Reconfigurable Platforms
Abstract. Many Field-Programmable Gate Array (FPGA) based systems utilize third-party intellectual property (IP) in their development. When they are deployed in non-networked envir...
Eric Simpson, Patrick Schaumont