Sciweavers

1240 search results - page 89 / 248
» Trusted Design in FPGAs
Sort
View
USS
2008
15 years 9 days ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
JUCS
2010
89views more  JUCS 2010»
14 years 8 months ago
Towards a Virtual Trusted Platform
: The advances and adoption of Trusted Computing and hardware assisted virtualisation technologies in standard PC platforms promise new approaches in building a robust virtualisati...
Martin Pirker, Ronald Toegl
IEEEARES
2007
IEEE
15 years 4 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
CN
2006
81views more  CN 2006»
14 years 10 months ago
Taxonomy of trust: Categorizing P2P reputation systems
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is to organize existing ideas and work to facilitate system design. We present a taxonomy...
Sergio Marti, Hector Garcia-Molina
AI
2002
Springer
14 years 9 months ago
Using Inter-agent Trust Relationships for Efficient Coalition Formation
We address long-term coalitions that are formed of both customer and vendor agents after evaluating their trust relationships with other agents in the system. We present a coalitio...
Silvia Breban, Julita Vassileva