Sciweavers

1229 search results - page 68 / 246
» Trusted Computing
Sort
View
CCGRID
2006
IEEE
15 years 1 months ago
Evaluating Provenance-based Trust for Scientific Workflows
Provenance is the documentation concerning the origin of a result generated by a process, and provides explanations about who, how, what resources were used in a process, and the ...
Shrija Rajbhandari, Ian Wootten, Ali Shaikh Ali, O...
ICPPW
2003
IEEE
15 years 3 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
IEEESCC
2010
IEEE
15 years 1 months ago
Analyzing Communities vs. Single Agent-Based Web Services: Trust Perspectives
—Gathering functionally similar agent-based Web services into communities has been proposed and promoted on many occasions. In this paper, we compare the performance of these com...
Babak Khosravifar, Jamal Bentahar, Ahmad Moazin, Z...
CSREASAM
2006
14 years 11 months ago
Trusted Storage: Focus on Use Cases
This paper describes use cases for the application of Trusted Computing Group (TCG) techniques and specifications to storage devices. The use cases fall into three broad categorie...
Robert Thibadeau, Michael Willett
AAAI
2007
15 years 5 days ago
A Multi-Dimensional Trust Model for Heterogeneous Contract Observations
In this paper we develop a novel probabilistic model of computational trust that allows agents to exchange and combine reputation reports over heterogeneous, correlated multi-dime...
Steven Reece, Stephen Roberts, Alex Rogers, Nichol...