Sciweavers

262 search results - page 11 / 53
» Providing Trusted Components to the Industry
Sort
View
IJNSEC
2011
272views more  IJNSEC 2011»
14 years 4 months ago
Trust Key Management Scheme for Wireless Body Area Networks
With recent advances in wireless sensor networks and embedded computing technologies, miniaturized pervasive health monitoring devices have become practically feasible. In additio...
Mohammed Mana, Mohammed Feham, Boucif Amar Bensabe...
IEEEARES
2010
IEEE
15 years 4 months ago
Patterns for Secure Boot and Secure Storage in Computer Systems
—Trusted Computing aims at enhancing the security of IT systems by using a combination of trusted hardware and software components to provide security guarantees. This includes s...
Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy
DBSEC
2003
113views Database» more  DBSEC 2003»
14 years 10 months ago
ECPV: Efficient Certificate Path Validation in Public-key Infrastructure
In the current public-key infrastructure (PKI) schemes based on X.509, a relying party must validate a user’s certificate as well as the existence of a path from its trust point...
Mahantesh Halappanavar, Ravi Mukkamala
BXML
2004
14 years 10 months ago
Ontology-derived Activity Components for Composing Travel Web Services
: In this paper we present our ongoing work in creating a semantic Web service composition and execution framework. The efforts described are undertaken in the context of the SATIN...
Matthias Flügge, Diana Tourtchaninova
ATAL
2005
Springer
15 years 3 months ago
Trust evaluation through relationship analysis
Current mechanisms for evaluating the trustworthiness of an agent within an electronic marketplace depend either on using a history of interactions or on recommendations from othe...
Ronald Ashri, Sarvapali D. Ramchurn, Jordi Sabater...