Currently the computer systems and software used by the average user offer virtually no security. Because of this many attacks, both simulated and real, have been described by the...
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
The Direct Anonymous Attestation (DAA) scheme provides a means for remotely authenticating a trusted platform whilst preserving the user’s privacy. The protocol has been adopted ...
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanis...
—Service-oriented computing promotes collaboration by defining the standards layer that allows compatibility between disparate domains. Workflows, by taking advantage of the serv...
Mine Altunay, Douglas E. Brown, Gregory T. Byrd, R...