Sciweavers

4111 search results - page 55 / 823
» Security, Protocols, and Trust
Sort
View
87
Voted
CCS
2007
ACM
15 years 6 months ago
Trusted computing challenges
Leendert van Doorn
76
Voted
ACSAC
1998
IEEE
15 years 4 months ago
The Solar Trust Model: Authentication Without Limitation
Michael Clifford, C. Lavine, Matt Bishop
73
Voted
DRMTICS
2005
Springer
15 years 2 months ago
TIVA: Trusted Integrity Verification Architecture
Mahadevan Gomathisankaran, Akhilesh Tyagi
IFIP
2009
Springer
15 years 7 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...
BPM
2003
Springer
102views Business» more  BPM 2003»
15 years 5 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory