Sciweavers

3299 search results - page 104 / 660
» Privacy and Trusted Computing
Sort
View
IAT
2007
IEEE
15 years 10 months ago
Aiding Human Reliance Decision Making Using Computational Models of Trust
This paper involves a human-agent system in which there is an operator charged with a pattern recognition task, using an automated decision aid. The objective is to make this huma...
Peter-Paul van Maanen, Tomas Klos, Kees van Dongen
IPMI
2005
Springer
16 years 5 months ago
Computational Elastography from Standard Ultrasound Image Sequences by Global Trust Region Optimization
Abstract. A new approach is proposed to estimate the spatial distribution of shear modulus of tissues in-vivo. An image sequence is acquired using a standard medical ultrasound sca...
Jan Kybic, Daniel Smutek
INFOCOM
2008
IEEE
15 years 11 months ago
A Practical and Flexible Key Management Mechanism For Trusted Collaborative Computing
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Xukai Zou, Yuan-Shun Dai, Elisa Bertino
ICWS
2007
IEEE
15 years 5 months ago
Virtualised Trusted Computing Platform for Adaptive Security Enforcement of Web Services Interactions
Security enforcement framework is an important aspect of any distributed system. With new requirements imposed by SOA-based business models, adaptive security enforcement on the a...
Ivan Djordjevic, Srijith K. Nair, Theodosis Dimitr...
GI
2009
Springer
15 years 2 months ago
Putting Privacy Pictograms into Practice - a European Perspective
: Recent proposals for privacy pictograms show a growing interest of simplifying privacy-related statements. Such pictograms can be useful to enhance the users' understanding ...
Marit Hansen