93,771 Hits in 3.7 sec

Towards platform-independent trusted computing

Ronald Toegl, Thomas Winkler, Mohammad Nauman, Theodore Hong
2009 Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09  
It would be desirable to extend the Trusted Computing mechanisms offered by the Trusted Platform Module into the platform independent Java environment.  ...  Software independence from hardware platforms is an important feature of growing significance, given the emergence of new distributed computing paradigms.  ...  This API is intended to bring the benefits of trusted computing to the platform-independent Java environment.  ... 
doi:10.1145/1655108.1655119 dblp:conf/ccs/ToeglWNH09 fatcat:fqbgwbjukrfhtjssv5uuoysdki

COREnect EuCNC workshop - Patrick Pipe

2021 Zenodo  
Interface to the OS o Enable trusted HW units o Isolate untrusted HW units o Allow transactions between units o Independent from chip network, i.e.  ...  6G From 5G to 6G Mobility Use Case for Trustworthy 6G Trustworthiness @ Different Levels Trustworthy Computing Platforms Conclusion Trustworthy Computing Platforms o SW industry is > 10x  ... 
doi:10.5281/zenodo.4982666 fatcat:mda3vix3qfgznepfob7sgn3i54

Establishing a Cloud Computing Success Model for Hospitals in Taiwan

Jiunn-Woei Lian
2017 Inquiry: The Journal of Health Care Organization, Provision, and Financing  
' trust toward the IS service providers.  ...  Hypothesis 7 (H7): Hospitals' trust toward computing service provider will positively affect their satisfaction.  ... 
doi:10.1177/0046958016685836 pmid:28112020 pmcid:PMC5798708 fatcat:fmz7lz7kfbclxkqg547o45tpim

Establishing Chain of Trust in Reconfigurable Hardware

Thomas Eisenbarth, Tim Guneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier
2007 15th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM 2007)  
Facing ubiquitous threats like computer viruses, trojans and theft of intellectual property, Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms.  ...  A recent initiative by the Trusted Computing Group (TCG) specifies the use of Trusted Platform Modules (TPM), currently implemented as dedicated, costeffective crypto-chips mounted on the main board of  ...  The transformation of FPGAs into trusted embedded computing platforms requires some modifications to the FPGA architectures which are not available today.  ... 
doi:10.1109/fccm.2007.23 dblp:conf/fccm/EisenbarthGPSWT07 fatcat:g3yj4wm25ja7pjzkfdh6bugj2i

Towards a High Assurance Secure Computing Platform

Michael D. DiRossi
2007 10th IEEE High Assurance Systems Engineering Symposium (HASE'07)  
Existing commodity operating systems alone do not satisfy the robust requirements of a general purpose, high assurance, secure computing platform.  ...  This paper presents the Trusted Ring Framework, a software architecture that provides a foundation from which to host security services that enhance the security of a commodity operating system.  ...  While commodity operating systems (e.g., Microsoft Windows, Linux) provide these benefits, their monolithic designs preclude them from serving as the Trusted Computing Base (TCB) [2] of robust platforms  ... 
doi:10.1109/hase.2007.25 dblp:conf/hase/DiRossi07 fatcat:a3umhxresvgzro7csxdy3yf6ai


K.V. K Mahesh Kumar .
2013 International Journal of Research in Engineering and Technology  
threats and Trust challenges for wide acceptance of cloud computing in organizations.  ...  This Research paper explores cloud computing architecture, service delivery models, Security & Privacy Issues and Trust Challenges.  ...  management • Privacy data protection • Organizational security management [4] , [9] , [12] TRUST Trust in cloud computing varies from platform to platform and depends on deployed service delivery  ... 
doi:10.15623/ijret.2013.0212103 fatcat:icnexueepvbajecp4kogt4decy

Autonomic and Trusted Computing Paradigms [chapter]

Xiaolin Li, Hui Kang, Patrick Harrington, Johnson Thomas
2006 Lecture Notes in Computer Science  
The new trend is to integrate both towards trusted autonomic computing systems.  ...  This paper presents a comprehensive survey of the autonomic and trusted computing paradigms and a preliminary conceptual architecture towards trustworthy autonomic grid computing.  ...  It is also an enabling capability towards trusted autonomic computing as presented in Sect.4.  ... 
doi:10.1007/11839569_14 fatcat:h2zowozaybgy5mqjmkxwfpbsni

An Autonomic Agent Trust Model for IoT systems

X. Xu, N. Bessis, J. Cao
2013 Procedia Computer Science  
Agent-based node in IoT systems is independent, self-governing software and hardware integrated system.  ...  Firstly, we analyze on the credibility of IoT systems and explain why IoT systems are difficult to achieve safe and reliable computing and service quality assurance mechanisms.  ...  Towards a Trusted Hardware Execution environment for Agent In the Agent-based IoT system, we have to embed Agents into sensor nodes.  ... 
doi:10.1016/j.procs.2013.09.016 fatcat:tllssnn5efd2lciw5ywfftca74

Enhancing Security in Cloud Using Trusted Monitoring Framework

M. Arun Fera, C. manikandaprabhu, Ilakiya Natarajan, K. Brinda, R. Darathiprincy
2015 Procedia Computer Science  
We design a trusted monitoring framework, which provides a chain of trust that excludes the untrusted privileged domain, as well as utilizing the trusted computing technology to ensure the integrity of  ...  Cloud computing is a technology that provides network based services on demand. Cloud computing technology provides advantages to end users and business organizations.  ...  Virtualization is a pillar technology in cloud computing for multiplexing computing resources on a single cloud platform for multiple cloud tenants.  ... 
doi:10.1016/j.procs.2015.04.170 fatcat:7hh2rozjyjftdlccgxfriykmd4

Countermeasures for mobile agent security

W.A Jansen
2000 Computer Communications  
Protecting Agents While countermeasures directed toward platform protection are a direct evolution of traditional mechanisms employed by trusted hosts, those directed toward agent protection often depart  ...  Rather than relying solely on the reputation of a code producer, it would be prudent to have an independent review and verification of code performed by a trusted party or rating service [13] .  ... 
doi:10.1016/s0140-3664(00)00253-x fatcat:x3qkeksfpzbvtaj7j4zw7bsqqm

A software-based root-of-trust primitive on multicore platforms

Qiang Yan, Jin Han, Yingjiu Li, Robert H. Deng, Tieyan Li
2011 Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11  
In this paper, we analyze the challenges of designing softwarebased root-of-trust on multicore platforms and present two practical attacks that utilize the parallel computing capability to break the existing  ...  We then propose a timing-based primitive, called MT-SRoT, as the first step towards software-based root-oftrust on multicore platforms.  ...  Our work shows the feasibility of building software-based rootof-trust on multicore platforms and provides a primitive, MT-SRoT, as the first step towards establishing a tamper-resistant execution environment  ... 
doi:10.1145/1966913.1966957 dblp:conf/ccs/YanHLDL11 fatcat:xpbk647hmneavpkajvqhq3plqu

Towards Integrating Trusted Execution Environment into Embedded Autonomic Systems

Mohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah
2015 2015 IEEE International Conference on Autonomic Computing  
Nowadays, there is a trend to integrate trusted computing concepts into autonomic systems.  ...  In this context, the Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted platforms.  ...  Originally, trusted computing relies on a separate hardware module, such as the trusted platform module (TPM), that offers a functional interface for platform security.  ... 
doi:10.1109/icac.2015.27 dblp:conf/icac/SabtAB15 fatcat:ajq4afrt4bcodifdrbcjr2a7ba

Convergence in trusted computing and virtualized systems: A new dimension towards trusted intelligent system

Thinh LE VINH, Samia Bouzefrane, Soumya Banerjee
2016 2016 International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)  
Trusted computing, which is based on hardware component such as Trusted Platform Module (TPM), can be also recognized as a set of technologies that provide a primitive security mechanism to protect computing  ...  Finally, we propose a road map towards Trusted Intelligent System (TIS) which may assist as a better kernel of trust while deploying various computationally intelligent components.  ... 
doi:10.1109/pemwn.2016.7842896 fatcat:ezg7rrjr35anberl7x3shw7kr4

The Adoption of Technology Acceptance Model (TAM) and Trust in Influencing Online Purchase Intention During the Covid-19 Pandemic: Empirical Evidence from Malaysia

Mei Kei Leong, Kamelia Chaichi
2021 International Journal of Academic Research in Business and Social Sciences  
Consumer attitudes towards online shopping: the effects of trust, perceived benefits and perceived web quality. Internet Research, 25(5), 707-733.  ...  The data were collected from 398 customers who purchased products through online platforms during the Covid-19 pandemic.  ...  Customers reviews are considered as a trust signal for the online platform.  ... 
doi:10.6007/ijarbss/v11-i8/10422 fatcat:ilq6kigau5dubbxvqlmcokc2su

Social Commerce Adoption Predictors: A Review and Weight Analysis [chapter]

Prianka Sarker, Laurie Hughe, Yogesh K. Dwivedi, Nripendra P. Rana
2020 Lecture Notes in Computer Science  
Buying and selling through social media can create a reliable and sustainable platform for buyers and vendors, offering an alternative platform to traditional online approaches.  ...  The review presented in this study suggests that the intention to purchase is the most frequently examined dependent variable and that trust in the social commerce context is a key factor.  ...  towards Members, Service quality, Perceived Sociability, Trust in Platform, Ease of navigation, Hedonic motivation, Perceived ease of use, facilitating conditions, Trust in the s-vendor The following  ... 
doi:10.1007/978-3-030-44999-5_15 fatcat:bquom6l2f5fklmz5z6yjy2ex3e
« Previous Showing results 1 — 15 out of 93,771 results