Sciweavers

3299 search results - page 174 / 660
» Privacy and Trusted Computing
Sort
View
PERCOM
2004
ACM
16 years 4 months ago
Mix Zones: User Privacy in Location-aware Services
Privacy of personal location information is becoming an increasingly important issue. This paper refines a method, called the mix zone, developed to enhance user privacy in locati...
Alastair R. Beresford, Frank Stajano
ICPPW
2003
IEEE
15 years 10 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
AAI
2004
112views more  AAI 2004»
15 years 5 months ago
Devising A Trust Model For Multi-Agent Interactions Using Confidence And Reputation
In open environments in which autonomous agents can break contracts, computational models of trust have an important role to play in determining who to interact with and how inter...
Sarvapali D. Ramchurn, Nicholas R. Jennings, Carle...
ATC
2007
Springer
15 years 11 months ago
Enhancing Grid Security Using Trusted Virtualization
Abstract. Grid applications have increasingly sophisticated functional and security requirements. However, current techniques mostly protect only the resource provider from attacks...
Hans Löhr, HariGovind V. Ramasamy, Ahmad-Reza...
ICPP
2002
IEEE
15 years 10 months ago
Integrating Trust into Grid Resource Management Systems
Grid computing systems that have been the focus of much research activities in recent years provide a virtual framework for controlled sharing of resources across institutional bo...
Farag Azzedin, Muthucumaru Maheswaran