A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
In Hardware We Trust
2019
Proceedings of the 56th Annual Design Automation Conference 2019 on - DAC '19
In this pilot research outputs of researchers employed by Dutch Universities that comply with the legal requirements of Article 25fa of the Dutch Copyright Act are distributed online and free of cost or ...
Research outputs are distributed six months after their first online publication in the original published version and with proper attribution to the source of the original publication. ...
This work has been supported by the projects HWSec, P3 and S7 within CRC 1119 CROSSING (German Research Foundation, DFG), the Intel ICRI-CARS institute, WearIT4Health (EU/Interreg/EMR) and in part by the ...
doi:10.1145/3316781.3323480
dblp:conf/dac/BatinaJMSS19
fatcat:kuppngfcgrh4vngiln2ho5dwtq
Fully Countering Trusting Trust through Diverse Double-Compiling
[article]
2010
arXiv
pre-print
, and a large industrial-strength C compiler, GCC), and (3) a description of approaches for applying DDC in various real-world scenarios. ...
In the DDC technique, source code is compiled twice: the source code of the compiler's parent is compiled using a trusted compiler, and then the putative compiler source code is compiled using the result ...
There are many ways we can gain diversity; these include diversity in compiler implementation, in time, in environment, and in input source code. ...
arXiv:1004.5534v1
fatcat:s7p77pfwonfjpbq3cjscwp6k6q
The Trusted Cloud: Addressing Security and Compliance
[chapter]
2014
Building the Infrastructure for Cloud Security
This new security approach is known as hardware-based or hardware-assisted security, and it becomes the basis for enabling the trusted clouds. ...
We'll also look at current pain points in the industry regarding security and the challenges involved in addressing those pains. ...
doi:10.1007/978-1-4302-6146-9_2
fatcat:k2wmlqogxzfbvhr6mle2wuwgze
50 Years of Isolation
2009
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing
Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing 978-0-7695-3737-5/09 $25.00 ...
Therefore, a fresh look at the available options for isolating program components is necessary and this paper provides an overview of previous activity and current research in the area. ...
Earlier 2nd and 3rd generation mainframe computer architectures did, however, provide separate hardware mechanisms to assist in a form of isolation. ...
doi:10.1109/uic-atc.2009.86
fatcat:yclabktn7ve2dnwcl2vresxoaa
A Multi-Tenancy Cloud Trust Model using Quality of Service Monitoring: A Case of Infrastructure as a Service (IaaS)
2021
International Journal of Computer Applications
It focuses on Infrastructure as a Service and, as seen in the results, assists cloud consumers in evaluating cloud service providers well before they purchase services. ...
They have faith but lack a way of verifying or even doing QoS monitoring on their own. To solve this problem, we propose a multi-tenancy cloud trust model that uses QoS monitoring. ...
Cloud Computing Service Security Strength Measuring Trust Model This trust model measures cloud security and establishes a trust value [5] . ...
doi:10.5120/ijca2021921175
fatcat:l6bkqlyfqbd2bfkuf674gszk6y
Identity management and trusted interaction in Internet and mobile computing
2014
IET Information Security
The aim of this article is to present an overview of central aspects of identity management in Internet and mobile computing with respect to security and trust. ...
Security and trust are two fundamental factors for sustainable development of identity management in online markets and communities. ...
In online environments we depend on a wide specter of things, ranging from computer hardware, software and data, to people and organisations. ...
doi:10.1049/iet-ifs.2012.0133
fatcat:idu3dxw5cfdezliw4rlkbtpzly
Broken trust: greed, mismanagement, & political manipulation at America's largest charitable trust
2007
ChoiceReviews
Peters said the same thing in his own way: "At the end of the day, when all of the net gains and losses are added up, we made money. I'm not one to brag, but that's what we did." ...
security guard in a stall of a public restroom, engaged in a sex act. ...
Appendix The Charitable Trust Provisions of Princess Pauahi's Will and Two Codicils I give, devise and bequeath all of the rest, residue and remainder of my estate real and personal, wherever situated ...
doi:10.5860/choice.44-3468
fatcat:eify67qglvecbjkh3qyv2ihc3y
Authentication, Access Control, Privacy, Threats and Trust Management Towards Securing Fog Computing Environments: A Review
[article]
2020
arXiv
pre-print
Therefore, trust and privacy is also a key challenge to gain market adoption for Fog. ...
In this paper, we perform a survey and propose a taxonomy, which presents an overview of existing security concerns in the context of the Fog computing paradigm. ...
In the trust management section, we have discussed trust, the scope of trust, trust model and the potential attack on the trust computation area. ...
arXiv:2003.00395v1
fatcat:32jta5ijkzb2nfi2hzatz5pbvi
Trusted Autonomy and Cognitive Cyber Symbiosis: Open Challenges
2015
Cognitive Computation
CoCyS focuses on the architecture and interface of a Trusted Autonomous System. ...
Trusted Autonomy (TA) is a field of research that focuses on understanding and designing the interaction space between two entities each of which exhibits a level of autonomy. ...
of 1975, as revised in 2008 (5). ...
doi:10.1007/s12559-015-9365-5
pmid:27257440
pmcid:PMC4867784
fatcat:zi6klz6m2je25lsrljoejhmr7m
Money and Trust in Metaverses, Bitcoin and Stablecoins in global social XR
[article]
2022
arXiv
pre-print
We present a state of the art and positioning book, about Web3, Bitcoin, and 'Metaverse'; describing the intersections and synergies. ...
This deployable lab is designed to inform development of secure value transaction, for small and medium sized companies. ...
be complex and painful. ...
arXiv:2207.09460v1
fatcat:ssy7jc7kffeetn2pl5kuwr2qva
Public Trust and Initiatives for New Health Care Partnerships
1998
Milbank Quarterly
manage the course of treatment; and to gain the patient's understanding, cooperation, and adherence to treatment. ...
Rapid changes in health care organization and medical practice also diminish effective communication, which is essential to the cultivation of patients' trust in their doctors and their health institutions ...
We tend to be intrigued by innovative hardware, but technology refers as well to the application of hardware, software, and organizational processes to the achievement of desired goals. ...
doi:10.1111/1468-0009.00089
pmid:9614423
pmcid:PMC2751075
fatcat:m6a2fxedzbelxmf6svksptlgxu
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
2021
Electronics
To provide the appropriate level of trust and privacy, there is a need to focus on authentication, threats and access control mechanisms as well as privacy protection techniques in Fog computing. ...
In this paper, a survey along with a taxonomy is proposed, which presents an overview of existing security concerns in the context of the Fog computing paradigm. ...
In the trust management section, we have discussed trust, the scope of trust, trust model and the potential attack on the trust computation area. ...
doi:10.3390/electronics10101171
fatcat:h2q4vbw4dja4ho5tbdj4ijbnje
A novel method for watermarking sequential circuits
2012
2012 IEEE International Symposium on Hardware-Oriented Security and Trust
To my mother and father, Kristy and Michael Lewandowski, I cannot thank you enough for your continued support, both emotionally and physically, throughout my many years of academia, and the many more to ...
Dedication I would like to dedicate this work to my beloved family, parents, and siblings. ...
His research interests are Design of Secure Hardware, Design Automation, and Reversible Logic. ...
doi:10.1109/hst.2012.6224313
dblp:conf/host/LewandowskiMMK12
fatcat:5ewe5u242jeafkkub6buf4igqm
What Influences the Perceived Trust of a Voice-Enabled Smart Home System: An Empirical Study
2021
Sensors
Trust in the marketing field is considered an indispensable component of all business transactions, which plays a crucial role in adopting new technologies. ...
China, one of the most populous and largest markets in the world, has tremendous business potential in the smart home industry. ...
For this paper, we define trust as the users' confidence in the reliability of smart homes to meet their needs and expectations. ...
doi:10.3390/s21062037
pmid:33805702
fatcat:hdnoloyayffkhbivciu62nwdlm
A model-driven penetration test framework for Web applications
2010
2010 Eighth International Conference on Privacy, Security and Trust
In this thesis, we propose a model-driven penetration test framework for web applications that consists of a penetration test methodology, a grey-box test architecture, a web security knowledgebase, a ...
Security experts are still required to build up and maintain a web security knowledgebase for test campaigns, but the general testers are capable of developing and executing penetration test campaigns ...
benefits gained in such a small team size. ...
doi:10.1109/pst.2010.5593250
dblp:conf/pst/XiongP10
fatcat:wlpjpnyrbjfdbbuimwaoorvjhu
« Previous
Showing results 1 — 15 out of 6,511 results