Sciweavers

3299 search results - page 37 / 660
» Privacy and Trusted Computing
Sort
View
ISI
2006
Springer
15 years 1 months ago
A Trust Model for Uncertain Interactions in Ubiquitous Environments
Hung Le Xuan, Hassan Jameel, Seong Jin Cho, Weiwei...
SP
2010
IEEE
179views Security Privacy» more  SP 2010»
15 years 9 days ago
TrustVisor: Efficient TCB Reduction and Attestation
Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zh...
SEFM
2003
IEEE
15 years 7 months ago
A Formal Model for Trust in Dynamic Networks
We propose a formal model of trust informed by the Global Computing scenario and focusing on the aspects of trust formation, evolution, and propagation. The model is based on a no...
Marco Carbone, Mogens Nielsen, Vladimiro Sassone
CCS
2007
ACM
15 years 6 months ago
Offline untrusted storage with immediate detection of forking and replay attacks
We address the problem of using an untrusted server with only a trusted timestamping device (TTD) to provide trusted storage for a large number of clients, where each client may o...
Marten van Dijk, Jonathan Rhodes, Luis F. G. Sarme...
IJNSEC
2006
71views more  IJNSEC 2006»
15 years 1 months ago
Fundamental Limits on a Model of Privacy-Trust Tradeoff: Information Theoretic Approach
Zhong et al. formulated the problem of disclosing credentials (associated with privacy) for building trust in an open environment like Internet. Thus, one form of privacy-trust pr...
Rama Murthy Garimella