Results 301 to 310 of about 150,216 (340)
Some of the next articles are maybe not open access.

Trust in Computing

2013
Trust is a very frequently used term in Computer Science. In this chapter, we will review some of the different contexts in which it is used and draw parallels when applicable with social cognitive trust constructs.
openaire   +2 more sources

Trusted Cloud Computing

2014
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework.
Krcmar, Helmut   +2 more
openaire   +3 more sources

Trust Computation in VANETs

2013 International Conference on Communication Systems and Network Technologies, 2013
In this work, we study the application of Perron-Frobenius theorem for computing trust in the VANET environment. Safety critical and safety related messages in a VANET can lead to major changes in the behavior of vehicles moving on the road which can prevent unpleasant traffic situations. False messages can result in serious conditions like collisions.
Brijesh Kumar Chaurasia   +2 more
openaire   +2 more sources

Trusted Computing and DRM

2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own
Nezer Jacob Zaidenberg   +3 more
openaire   +2 more sources

Trusted Computing or Distributed Trust Management?

2011
Nowadays, in contrast with centralized or hierarchical certification authorities and directory of names, other solutions are gaining momentum. Federation of already deployed security systems is considered the key to build global security infrastructures.
openaire   +2 more sources

Pairings in Trusted Computing

2008
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly
Chen, Liqun   +2 more
openaire   +2 more sources

Trusted Computing Grundlagen [PDF]

open access: possible, 2008
Der Mangel an Sicherheit und Verlasslichkeit in den heutigen vernetzten IT-Systemen hat in den letzten 20 Jahren zu immer intensiveren und komplexeren Angriffen auf die Sicherheit der Computer-Infrastruktur gefuhrt. Besonders in der PC-Welt mit ihrer tiefen Vernetzung und dem Einsatz von SW, die auf diese stark zunehmenden Angriffe nicht vorbereitet ...
openaire   +1 more source

Trusted Volunteer Computing

2017
The paper propose a system that is tailored for trusted execution environments.
Ianni M., Masciari E.
openaire   +3 more sources

Trusted Computing in Context

IEEE Security and Privacy Magazine, 2007
The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer.
openaire   +2 more sources

Trusted Computer Systems

1981 IEEE Symposium on Security and Privacy, 1981
The DOD Computer Security Initiative, is aimed at stimulating the widespread commercial availability of trusted computer systems. A trusted computer system is one that employs sufficient hardware and software integrity measures to allow its use in processing multiple levels of classified or sensitive information.
openaire   +2 more sources

Home - About - Disclaimer - Privacy