Sciweavers

101 search results - page 4 / 21
» Service Graphs for Building Trust
Sort
View
P2P
2005
IEEE
106views Communications» more  P2P 2005»
15 years 3 months ago
Trusted Computing: Providing Security for Peer-to-Peer Networks
In this paper, we demonstrate the application of Trusted Computing to securing Peer-to-Peer (P2P) networks. We identify a central challenge in providing many of the security servi...
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
85
Voted
DIM
2007
ACM
15 years 1 months ago
Receipt management- transaction history based trust establishment
In a history-based trust-management system, users and service providers use information about past transactions to make trust-based decisions concerning current transactions. One ...
Abhilasha Bhargav-Spantzel, Jungha Woo, Elisa Bert...
IPPS
2007
IEEE
15 years 3 months ago
Improving Secure Communication Policy Agreements by Building Coalitions
In collaborative applications, participants agree on certain level of secure communication based on communication policy specifications. Given secure communication policy speciļ¬...
Srilaxmi Malladi, Sushil K. Prasad, Shamkant B. Na...
USS
2008
14 years 11 months ago
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties wit
We tackle the problem of building privacy-preserving device-tracking systems -- or private methods to assist in the recovery of lost or stolen Internet-connected mobile devices. T...
Thomas Ristenpart, Gabriel Maganis, Arvind Krishna...
SACMAT
2005
ACM
15 years 3 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang