Sciweavers

1715 search results - page 243 / 343
» Trust and Reputation Systems
Sort
View
IH
1998
Springer
15 years 2 months ago
Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations
It is well known that eavesdroppers can reconstruct video screen content from radio frequency emanations. We discuss techniques that enable the software on a computer to control th...
Markus G. Kuhn, Ross J. Anderson
AGENTS
1997
Springer
15 years 2 months ago
Software Agents and User Autonomy
: Software agents comprise a new area for research and soon will be embedded and ubiquitous in modern computing systems. In this formative phase, it is important to develop compreh...
Batya Friedman, Helen Nissenbaum
HASE
2007
IEEE
15 years 1 months ago
Precise Documentation of Critical Software
This experience and research based paper discusses the reasons that software cannot be trusted and then explains how the use of greatly improved documentation can make software mo...
David Lorge Parnas, Sergiy A. Vilkomir
DATE
2004
IEEE
139views Hardware» more  DATE 2004»
15 years 1 months ago
Flexible Software Protection Using Hardware/Software Codesign Techniques
A strong level of trust in the software running on an embedded processor is a prerequisite for its widespread deployment in any high-risk system. The expanding field of software p...
Joseph Zambreno, Alok N. Choudhary, Rahul Simha, B...
ESORICS
2000
Springer
15 years 1 months ago
Verification of a Formal Security Model for Multiapplicative Smart Cards
Abstract. We present a generic formal security model for operating systems of multiapplicative smart cards. The model formalizes the main security aspects of secrecy, integrity, se...
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, ...