Sciweavers

1229 search results - page 109 / 246
» Trusted Computing
Sort
View
GECCO
2007
Springer
181views Optimization» more  GECCO 2007»
15 years 4 months ago
A study on metamodeling techniques, ensembles, and multi-surrogates in evolutionary computation
Surrogate-Assisted Memetic Algorithm(SAMA) is a hybrid evolutionary algorithm, particularly a memetic algorithm that employs surrogate models in the optimization search. Since mos...
Dudy Lim, Yew-Soon Ong, Yaochu Jin, Bernhard Sendh...
DBSEC
2008
129views Database» more  DBSEC 2008»
14 years 11 months ago
Sharing but Protecting Content Against Internal Leakage for Organisations
Abstract. Dishonest employees, who have privileges to obtain corporate critical information and access internal resources, cause the problem of internal leakage. Employees, who hav...
Muntaha Alawneh, Imad M. Abbadi
CISC
2007
Springer
98views Cryptology» more  CISC 2007»
15 years 4 months ago
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM
Abstract. The Trusted Computing Group (TCG) defines the specifications for the Trusted Platform Module (TPM) and corresponding trust mechanisms that allow a TPM-enabled platform ...
Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffr...
CCS
2001
ACM
15 years 2 months ago
Secure Open Systems for Protecting Privacy and Digital Services
This paper describes and analyzes a system architecture that enables consumers to access services and content from multiple providers without jeopardizing the privacy interests of...
David W. Kravitz, Kim-Ee Yeoh, Nicol So
LCN
2006
IEEE
15 years 4 months ago
Detecting Malicious Peers in Overlay Multicast Streaming
Overlay multicast streaming is built out of loosely coupled end-hosts (peers) that contribute resources to stream media to other peers. Peers, however, can be malicious. They may ...
Samarth Shetty, Patricio Galdames, Wallapak Tavana...