Results 301 to 310 of about 150,216 (340)
Some of the next articles are maybe not open access.
2013
Trust is a very frequently used term in Computer Science. In this chapter, we will review some of the different contexts in which it is used and draw parallels when applicable with social cognitive trust constructs.
openaire +2 more sources
Trust is a very frequently used term in Computer Science. In this chapter, we will review some of the different contexts in which it is used and draw parallels when applicable with social cognitive trust constructs.
openaire +2 more sources
2014
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework.
Krcmar, Helmut+2 more
openaire +3 more sources
This book documents the scientific results of the projects related to the Trusted Cloud Program, covering fundamental aspects of trust, security, and quality of service for cloud-based services and applications. These results aim to allow trustworthy IT applications in the cloud by providing a reliable and secure technical and legal framework.
Krcmar, Helmut+2 more
openaire +3 more sources
2013 International Conference on Communication Systems and Network Technologies, 2013
In this work, we study the application of Perron-Frobenius theorem for computing trust in the VANET environment. Safety critical and safety related messages in a VANET can lead to major changes in the behavior of vehicles moving on the road which can prevent unpleasant traffic situations. False messages can result in serious conditions like collisions.
Brijesh Kumar Chaurasia+2 more
openaire +2 more sources
In this work, we study the application of Perron-Frobenius theorem for computing trust in the VANET environment. Safety critical and safety related messages in a VANET can lead to major changes in the behavior of vehicles moving on the road which can prevent unpleasant traffic situations. False messages can result in serious conditions like collisions.
Brijesh Kumar Chaurasia+2 more
openaire +2 more sources
2015
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own
Nezer Jacob Zaidenberg+3 more
openaire +2 more sources
Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own
Nezer Jacob Zaidenberg+3 more
openaire +2 more sources
Trusted Computing or Distributed Trust Management?
2011Nowadays, in contrast with centralized or hierarchical certification authorities and directory of names, other solutions are gaining momentum. Federation of already deployed security systems is considered the key to build global security infrastructures.
openaire +2 more sources
2008
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly
Chen, Liqun+2 more
openaire +2 more sources
Pairings have now been used for constructive applications in cryptography for around eight years. In that time the range of applications has grown from a relatively narrow one of identity based encryption and signatures, through to more advanced protocols. In addition implementors have realised that pairing protocols once presented can often be greatly
Chen, Liqun+2 more
openaire +2 more sources
Trusted Computing Grundlagen [PDF]
Der Mangel an Sicherheit und Verlasslichkeit in den heutigen vernetzten IT-Systemen hat in den letzten 20 Jahren zu immer intensiveren und komplexeren Angriffen auf die Sicherheit der Computer-Infrastruktur gefuhrt. Besonders in der PC-Welt mit ihrer tiefen Vernetzung und dem Einsatz von SW, die auf diese stark zunehmenden Angriffe nicht vorbereitet ...
openaire +1 more source
2017
The paper propose a system that is tailored for trusted execution environments.
Ianni M., Masciari E.
openaire +3 more sources
The paper propose a system that is tailored for trusted execution environments.
Ianni M., Masciari E.
openaire +3 more sources
IEEE Security and Privacy Magazine, 2007
The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer.
openaire +2 more sources
The trusted computing technology embodied in the Trusted Platform Module secure-coprocessor from the Trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer.
openaire +2 more sources
1981 IEEE Symposium on Security and Privacy, 1981
The DOD Computer Security Initiative, is aimed at stimulating the widespread commercial availability of trusted computer systems. A trusted computer system is one that employs sufficient hardware and software integrity measures to allow its use in processing multiple levels of classified or sensitive information.
openaire +2 more sources
The DOD Computer Security Initiative, is aimed at stimulating the widespread commercial availability of trusted computer systems. A trusted computer system is one that employs sufficient hardware and software integrity measures to allow its use in processing multiple levels of classified or sensitive information.
openaire +2 more sources