Sciweavers

3299 search results - page 103 / 660
» Privacy and Trusted Computing
Sort
View
ICPPW
2006
IEEE
15 years 10 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
MHCI
2005
Springer
15 years 10 months ago
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Dan Hong, Mingxuan Yuan, Vincent Y. Shen
PDCAT
2005
Springer
15 years 10 months ago
Trusted Computing-Based Security Architecture For 4G Mobile Networks
In this paper security requirements and security architecture for 4G systems are presented with the consideration of Trusted Computing (TC) for mobile equipment (ME). The security...
Yu Zheng, Dake He, Weichi Yu, Xiaohu Tang
IJAR
2007
104views more  IJAR 2007»
15 years 4 months ago
On representation and aggregation of social evaluations in computational trust and reputation models
Interest for computational trust and reputation models is on the rise. One of the most important aspects of these models is how they deal with information received from other indi...
Jordi Sabater-Mir, Mario Paolucci
GCA
2009
15 years 2 months ago
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation
This paper highlights the need to meet both Grid user and resource provider security requirements, describing the rationale for securing Grid workflows: a set of tasks arranged int...
Po-Wah Yau, Allan Tomlinson