Sciweavers

1229 search results - page 96 / 246
» Trusted Computing
Sort
View
CCS
2005
ACM
15 years 3 months ago
Preventing attribute information leakage in automated trust negotiation
Automated trust negotiation is an approach which establishes trust between strangers through the bilateral, iterative disclosure of digital credentials. Sensitive credentials are ...
Keith Irwin, Ting Yu
ICOIN
2003
Springer
15 years 3 months ago
Do Not Trust All Simulation Studies of Telecommunication Networks
Since the birth of ARPANET and the first commercial applications of computer networks, through explosion of popularity of the Internet and wireless communications, we have witnes...
Krzysztof Pawlikowski
SEMWEB
2009
Springer
15 years 2 months ago
Reasoning With Provenance, Trust and all that other Meta Knowlege in OWL
Abstract—For many tasks, such as the integration of knowledge bases in the semantic web, one must not only handle the knowledge itself, but also characterizations of this knowled...
Simon Schenk, Renata Queiroz Dividino, Steffen Sta...
INTERACT
2003
14 years 11 months ago
Human and Humanoid Don't Match: Consistency Preference and Impact on Users' Trust
Abstract: For many anthropomorphic representations on computer interfaces, there are choices of using mediacaptured human components and using computer-synthesized humanoid counter...
Li Gong
DBSEC
2009
110views Database» more  DBSEC 2009»
14 years 11 months ago
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients
Existing approaches for protecting sensitive information stored (outsourced) at external "honest-but-curious" servers are typically based on an overlying layer of encrypt...
Valentina Ciriani, Sabrina De Capitani di Vimercat...