Results 261 to 270 of about 13,284 (309)
Some of the next articles are maybe not open access.

Trusted Computing Management Server Making Trusted Computing User Friendly

2009
Personal Computers (PC) with build in Trusted Computing (TC) technology are already well known and widely distributed. Nearly every new business notebook contains now a Trusted Platform Module (TPM) and could be used with increased trust and security features in daily application and use scenarios.
Sönke Sothmann, Sumanta Chaudhuri
openaire   +1 more source

Trusted Cloud Computing

2014
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework.
Jakel, Rene   +6 more
openaire   +4 more sources

Enforcing Trust in Pervasive Computing with Trusted Computing Technology

2006
Pervasive computing as a concept holds the promise of simplifying daily life by integrating mobile devices and digital infrastructures into our physical world. These devices in a pervasive environment would establish dynamic ad-hoc networks to provide ubiquitous services.
Shiqun Li   +3 more
openaire   +1 more source

Trusted computing systems

Proceedings of the 14th international conference on Software engineering - ICSE '92, 1992
We delineate a fine-grained approach to the development of embedded computing systems, including such which exhibit real-time properties - that is: reactive systems. The "approach" is a postulate - it has not yet been widely tested. And the "dogmas" of the paper are rather idealistic - but indicative of current, we believe, leading research directions ...
openaire   +1 more source

Trust in Computers

2010
Research based on the Computers-Are-Social-Actors (CASA) paradigm has documented that people’s responses to computers are fundamentally “social”—that is, people apply social rules, norms, and expectations core to interpersonal relationships when they interact with computers.
Jong-Eun Roselyn Lee, Clifford I. Nass
openaire   +1 more source

Trusted computing: integrating trust and security into computer platforms

IET Conference on Crime and Security, 2006
The Trusted Computing Group (TCG) is an industry standards body, comprised of computer and device manufacturers, software vendors and others with a stake in enhancing the security of the computing environment across multiple platforms and devices. TCG develops and promotes open industry standard specifications for trusted computing hardware building ...
openaire   +1 more source

Trusting Computers Through Trusting Humans

2011
This chapter considers the question of how we may trust automatically generated program code. The code walkthroughs and inspections of software engineering mimic the ways that mathematicians go about assuring themselves that a mathematical proof is true.
openaire   +1 more source

Trusting your computer to be trusted

Computer Fraud & Security, 2005
The spread of ‘trust’ is unstoppable… The Trusted Computing Group is a movement from the most formidable software and hardware manufacturers in the world to develop an architecture that would improve the underlying security of computers. The Trusted Computing Group aims to make sure a computer is working to a specified expectation of behaviour.
openaire   +1 more source

Trust Modeling and Computational Trust

2013
The trust model is the method to specify, evaluate, setup, and ensure trust relationships. It is the way to assist the process of trust in a digital system. This chapter introduces the technologies of trust modeling. The authors classify existing trust models based on different criteria and introduce a number of theories or technologies applied in ...
openaire   +1 more source

Trusted Computing or Distributed Trust Management?

2011
Nowadays, in contrast with centralized or hierarchical certification authorities and directory of names, other solutions are gaining momentum. Federation of already deployed security systems is considered the key to build global security infrastructures.
openaire   +2 more sources

Home - About - Disclaimer - Privacy