Sciweavers

1229 search results - page 79 / 246
» Trusted Computing
Sort
View
AINA
2009
IEEE
15 years 4 months ago
Social Network-Based Trust for Agent-Based Services
— In service-oriented environments, reputation-based service selection is gaining increasing prominence. We propose in this paper a social network-based approach to model and ana...
Jamal Bentahar, Babak Khosravifar, Maziar Gomrokch...
CHI
2007
ACM
15 years 10 months ago
Multiview: improving trust in group video conferencing through spatial faithfulness
Video conferencing is still considered a poor alternative to face-to-face meetings. In the business setting, where these systems are most prevalent, the misuse of video conferenci...
David T. Nguyen, John Canny
AINA
2007
IEEE
15 years 4 months ago
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules
The random oracle model is an idealized theoretical model that has been successfully used for designing many cryptographic algorithms and protocols. Unfortunately, a series of res...
Vandana Gunupudi, Stephen R. Tate
AINA
2006
IEEE
15 years 4 months ago
Remote Trust with Aspect-Oriented Programming
Given a client/server application, how can the server entrust the integrity of the remote client, albeit the latter is running on an un-trusted machine? To address this research p...
Paolo Falcarin, Riccardo Scandariato, Mario Baldi
COMPUTER
2004
120views more  COMPUTER 2004»
14 years 9 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson