6,511 Hits in 9.5 sec

In Hardware We Trust

Lejla Batina, Patrick Jauernig, Nele Mentens, Ahmad-Reza Sadeghi, Emmanuel Stapf
2019 Proceedings of the 56th Annual Design Automation Conference 2019 on - DAC '19  
In this pilot research outputs of researchers employed by Dutch Universities that comply with the legal requirements of Article 25fa of the Dutch Copyright Act are distributed online and free of cost or  ...  Research outputs are distributed six months after their first online publication in the original published version and with proper attribution to the source of the original publication.  ...  This work has been supported by the projects HWSec, P3 and S7 within CRC 1119 CROSSING (German Research Foundation, DFG), the Intel ICRI-CARS institute, WearIT4Health (EU/Interreg/EMR) and in part by the  ... 
doi:10.1145/3316781.3323480 dblp:conf/dac/BatinaJMSS19 fatcat:kuppngfcgrh4vngiln2ho5dwtq

Fully Countering Trusting Trust through Diverse Double-Compiling [article]

David A. Wheeler
2010 arXiv   pre-print
, and a large industrial-strength C compiler, GCC), and (3) a description of approaches for applying DDC in various real-world scenarios.  ...  In the DDC technique, source code is compiled twice: the source code of the compiler's parent is compiled using a trusted compiler, and then the putative compiler source code is compiled using the result  ...  There are many ways we can gain diversity; these include diversity in compiler implementation, in time, in environment, and in input source code.  ... 
arXiv:1004.5534v1 fatcat:s7p77pfwonfjpbq3cjscwp6k6q

The Trusted Cloud: Addressing Security and Compliance [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
This new security approach is known as hardware-based or hardware-assisted security, and it becomes the basis for enabling the trusted clouds.  ...  We'll also look at current pain points in the industry regarding security and the challenges involved in addressing those pains.  ... 
doi:10.1007/978-1-4302-6146-9_2 fatcat:k2wmlqogxzfbvhr6mle2wuwgze

50 Years of Isolation

Nuwan A. Goonasekera, William J. Caelli, Tony Sahama
2009 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing  
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing 978-0-7695-3737-5/09 $25.00  ...  Therefore, a fresh look at the available options for isolating program components is necessary and this paper provides an overview of previous activity and current research in the area.  ...  Earlier 2nd and 3rd generation mainframe computer architectures did, however, provide separate hardware mechanisms to assist in a form of isolation.  ... 
doi:10.1109/uic-atc.2009.86 fatcat:yclabktn7ve2dnwcl2vresxoaa

A Multi-Tenancy Cloud Trust Model using Quality of Service Monitoring: A Case of Infrastructure as a Service (IaaS)

Pascal M. Mutulu, Andrew M. Kahonge
2021 International Journal of Computer Applications  
It focuses on Infrastructure as a Service and, as seen in the results, assists cloud consumers in evaluating cloud service providers well before they purchase services.  ...  They have faith but lack a way of verifying or even doing QoS monitoring on their own. To solve this problem, we propose a multi-tenancy cloud trust model that uses QoS monitoring.  ...  Cloud Computing Service Security Strength Measuring Trust Model This trust model measures cloud security and establishes a trust value [5] .  ... 
doi:10.5120/ijca2021921175 fatcat:l6bkqlyfqbd2bfkuf674gszk6y

Identity management and trusted interaction in Internet and mobile computing

Audun Jøsang
2014 IET Information Security  
The aim of this article is to present an overview of central aspects of identity management in Internet and mobile computing with respect to security and trust.  ...  Security and trust are two fundamental factors for sustainable development of identity management in online markets and communities.  ...  In online environments we depend on a wide specter of things, ranging from computer hardware, software and data, to people and organisations.  ... 
doi:10.1049/iet-ifs.2012.0133 fatcat:idu3dxw5cfdezliw4rlkbtpzly

Broken trust: greed, mismanagement, & political manipulation at America's largest charitable trust

2007 ChoiceReviews  
Peters said the same thing in his own way: "At the end of the day, when all of the net gains and losses are added up, we made money. I'm not one to brag, but that's what we did."  ...  security guard in a stall of a public restroom, engaged in a sex act.  ...  Appendix The Charitable Trust Provisions of Princess Pauahi's Will and Two Codicils I give, devise and bequeath all of the rest, residue and remainder of my estate real and personal, wherever situated  ... 
doi:10.5860/choice.44-3468 fatcat:eify67qglvecbjkh3qyv2ihc3y

Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review [article]

Abdullah Al-Noman Patwary, Anmin Fu, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Md Anwarul Kaium Patwary, Erfan Aghasian
2020 arXiv   pre-print
Therefore, trust and privacy is also a key challenge to gain market adoption for Fog.  ...  In this paper, we perform a survey and propose a taxonomy, which presents an overview of existing security concerns in the context of the Fog computing paradigm.  ...  In the trust management section, we have discussed trust, the scope of trust, trust model and the potential attack on the trust computation area.  ... 
arXiv:2003.00395v1 fatcat:32jta5ijkzb2nfi2hzatz5pbvi

Trusted Autonomy and Cognitive Cyber Symbiosis: Open Challenges

Hussein A. Abbass, Eleni Petraki, Kathryn Merrick, John Harvey, Michael Barlow
2015 Cognitive Computation  
CoCyS focuses on the architecture and interface of a Trusted Autonomous System.  ...  Trusted Autonomy (TA) is a field of research that focuses on understanding and designing the interaction space between two entities each of which exhibits a level of autonomy.  ...  of 1975, as revised in 2008 (5).  ... 
doi:10.1007/s12559-015-9365-5 pmid:27257440 pmcid:PMC4867784 fatcat:zi6klz6m2je25lsrljoejhmr7m

Money and Trust in Metaverses, Bitcoin and Stablecoins in global social XR [article]

John Joseph O'Hare, Allen Fairchild, Umran Ali
2022 arXiv   pre-print
We present a state of the art and positioning book, about Web3, Bitcoin, and 'Metaverse'; describing the intersections and synergies.  ...  This deployable lab is designed to inform development of secure value transaction, for small and medium sized companies.  ...  be complex and painful.  ... 
arXiv:2207.09460v1 fatcat:ssy7jc7kffeetn2pl5kuwr2qva

Public Trust and Initiatives for New Health Care Partnerships

David Mechanic
1998 Milbank Quarterly  
manage the course of treatment; and to gain the patient's understanding, cooperation, and adherence to treatment.  ...  Rapid changes in health care organization and medical practice also diminish effective communication, which is essential to the cultivation of patients' trust in their doctors and their health institutions  ...  We tend to be intrigued by innovative hardware, but technology refers as well to the application of hardware, software, and organizational processes to the achievement of desired goals.  ... 
doi:10.1111/1468-0009.00089 pmid:9614423 pmcid:PMC2751075 fatcat:m6a2fxedzbelxmf6svksptlgxu

Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control

Abdullah Al-Noman Patwary, Ranesh Kumar Naha, Saurabh Garg, Sudheer Kumar Battula, Md Anwarul Kaium Patwary, Erfan Aghasian, Muhammad Bilal Amin, Aniket Mahanti, Mingwei Gong
2021 Electronics  
To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing.  ...  In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm.  ...  In the trust management section, we have discussed trust, the scope of trust, trust model and the potential attack on the trust computation area.  ... 
doi:10.3390/electronics10101171 fatcat:h2q4vbw4dja4ho5tbdj4ijbnje

A novel method for watermarking sequential circuits

Matthew Lewandowski, Richard Meana, Matthew Morrison, Srinivas Katkoori
2012 2012 IEEE International Symposium on Hardware-Oriented Security and Trust  
To my mother and father, Kristy and Michael Lewandowski, I cannot thank you enough for your continued support, both emotionally and physically, throughout my many years of academia, and the many more to  ...  Dedication I would like to dedicate this work to my beloved family, parents, and siblings.  ...  His research interests are Design of Secure Hardware, Design Automation, and Reversible Logic.  ... 
doi:10.1109/hst.2012.6224313 dblp:conf/host/LewandowskiMMK12 fatcat:5ewe5u242jeafkkub6buf4igqm

What Influences the Perceived Trust of a Voice-Enabled Smart Home System: An Empirical Study

Yuqi Liu, Yan Gan, Yao Song, Jing Liu
2021 Sensors  
Trust in the marketing field is considered an indispensable component of all business transactions, which plays a crucial role in adopting new technologies.  ...  China, one of the most populous and largest markets in the world, has tremendous business potential in the smart home industry.  ...  For this paper, we define trust as the users' confidence in the reliability of smart homes to meet their needs and expectations.  ... 
doi:10.3390/s21062037 pmid:33805702 fatcat:hdnoloyayffkhbivciu62nwdlm

A model-driven penetration test framework for Web applications

Pulei Xiong, Liam Peyton
2010 2010 Eighth International Conference on Privacy, Security and Trust  
In this thesis, we propose a model-driven penetration test framework for web applications that consists of a penetration test methodology, a grey-box test architecture, a web security knowledgebase, a  ...  Security experts are still required to build up and maintain a web security knowledgebase for test campaigns, but the general testers are capable of developing and executing penetration test campaigns  ...  benefits gained in such a small team size.  ... 
doi:10.1109/pst.2010.5593250 dblp:conf/pst/XiongP10 fatcat:wlpjpnyrbjfdbbuimwaoorvjhu
« Previous Showing results 1 — 15 out of 6,511 results