Sciweavers

3299 search results - page 102 / 660
» Privacy and Trusted Computing
Sort
View
JUCS
2010
114views more  JUCS 2010»
14 years 11 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
DBSEC
2007
104views Database» more  DBSEC 2007»
15 years 5 months ago
New Paradigm of Inference Control with Trusted Computing
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
Yanjiang Yang, Yingjiu Li, Robert H. Deng
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 4 months ago
Employing Trusted Computing for the forward pricing of pseudonyms in reputation systems
Reputation and recommendation systems are fundamental for the formation of community market places. Yet, they are easy targets for attacks which disturb a market's equilibriu...
Nicolai Kuntze, Dominique Maehler, Andreas U. Schm...
ICDCS
2008
IEEE
15 years 11 months ago
Updates and Asynchronous Communication in Trusted Computing Systems
Software-based usage controls typically are vulnerable to attacks. Trusted Platform Modules (TPMs) can enable much more robust controls. However, as conventionally understood, TPM...
José Carlos Brustoloni, David Kyle
SIGOPSE
2004
ACM
15 years 10 months ago
Secure bootstrap is not enough: shoring up the trusted computing base
We propose augmenting secure boot with a mechanism to protect against compromises to field-upgradeable devices. In particular, secure boot standards should verify the firmware o...
James Hendricks, Leendert van Doorn