A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Trusting Computations: a Mechanized Proof from Partial Differential Equations to Actual Program
[article]
2014
arXiv
pre-print
In fact, we have gone much further as we have mechanically verified the convergence of the numerical scheme in order to get a complete formal proof covering all aspects from partial differential equations ...
Computer programs may go wrong due to exceptional behaviors, out-of-bound array accesses, or simply coding errors. Thus, they cannot be blindly trusted. ...
Acknowledgments We are grateful to Manuel Kauers, Veronika Pillwein, and Bruno Salvy, who provided us help with the nonnegativity of the fundamental solution of the discrete wave equation (Lemma 5.2). ...
arXiv:1212.6641v3
fatcat:h25wy4wfr5fm3orhck5qzsyjdu
Trusting computations: A mechanized proof from partial differential equations to actual program
2014
Computers and Mathematics with Applications
In fact, we have gone much further as we have mechanically verified the convergence of the numerical scheme in order to get a complete formal proof covering all aspects from partial differential equations ...
Computer programs may go wrong due to exceptional behaviors, out-of-bound array accesses, or simply coding errors. Thus, they cannot be blindly trusted. ...
Acknowledgments We are grateful to Manuel Kauers, Veronika Pillwein, and Bruno Salvy, who provided us help with the nonnegativity of the fundamental solution of the discrete wave equation (Lemma 5.2). ...
doi:10.1016/j.camwa.2014.06.004
fatcat:5ahg2ixh3naolpl4pdm5u5fac4
Reputation-based trust management
2005
Journal of Computer Security
We propose a formal model for reputation-based trust management. In contrast to credential-based trust management, in our framework an agent's reputation serves as the basis for trust. ...
For example, an access control policy may consider the agent's reputation when deciding whether to offer him a license for accessing a protected resource. ...
Our types are intended to serve as the roots of a type hierarchy in any actual implementation of a trust management system based on our framework. ...
doi:10.3233/jcs-2005-13107
fatcat:qmolfaoeafc5lhi4hchcg7tpqq
Department of Defense Trusted Computer System Evaluation Criteria
[chapter]
1985
The 'Orange Book' Series
Trusted Path -A mechanism by which a person at a terminal can communicate directly with the Trusted Computing Base. ...
The bounds of the TCB equate to the "security perimeter" referenced in some computer security literature. ...
Exploitable Channel -Any channel that is useable or detectable by subjects external to the Trusted Computing Base. ...
doi:10.1007/978-1-349-12020-8_1
fatcat:nudeck4dp5ek5gkcflpbmsmgqq
Computing across Trust Boundaries using Distributed Homomorphic Cryptography
[article]
2019
IACR Cryptology ePrint Archive
Hence, this work constitutes a step forward in secure computation, by enabling computation across trust boundaries. ...
We approach SMC as a computational problem and propose a novel formulation of this problem in terms of trust boundaries. ...
ACKNOWLEDGMENTS The authors would like to thank Jean-Philippe Bossuat for the implementation of the distributed cryptosystem, and all those who provided the valuable reviews and comments. ...
dblp:journals/iacr/MouchetTH19
fatcat:ueaxwchh7ndyhl7q3nmlolkgim
Fully Countering Trusting Trust through Diverse Double-Compiling
[article]
2010
arXiv
pre-print
This dissertation's thesis is that the trusting trust attack can be detected and effectively countered using the "Diverse Double-Compiling" (DDC) technique, as demonstrated by (1) a formal proof that DDC ...
An Air Force evaluation of Multics, and Ken Thompson's Turing award lecture ("Reflections on Trusting Trust"), showed that compilers can be subverted to insert malicious Trojan horses into critical software ...
actually run by the computer 1 . ...
arXiv:1004.5534v1
fatcat:s7p77pfwonfjpbq3cjscwp6k6q
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
2019
Security and Communication Networks
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits. ...
This paper also addresses three open challenges: (1) defeating malicious adversaries, (2) mobile-friendly TEE-supported SMC, and (3) a more general coupling of trusted hardware and privacy-preserving computation ...
Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work. ...
doi:10.1155/2019/1368905
fatcat:izynm6msrvehfa3ghkw7tykk34
A trust model in cloud computing based on fuzzy logic
2016
2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)
In cloud computing, trust helps the consumer to choose the service of a cloud provider for storing and processing their sensitive information. ...
It is common to hear organizations-big or small are moving to cloud computing for its scalability and cost savings. But, how do you decide which cloud provider to trust? ...
• Trust Model in Mobile ad-Hoc Theodorakopoulos and Baras [35] have introduced a trust model to compute the trust proofs in ad-hoc networks. The evidences of trust were unsure and partial. ...
doi:10.1109/rteict.2016.7807780
fatcat:z5f5enwbgnchngmjdatgksnoue
A Bayesian Model for Event-based Trust
2007
Electronical Notes in Theoretical Computer Science
One alternative currently being investigated is to support security decision-making by explicit representation of principals' trusting relationships, i.e., via systems for computational trust. ...
Using it, we compare some of the systems from the computational trust literature; the comparison is derived formally, rather than obtained via experimental simulation as traditionally done. ...
A maximal partial cell is called a cell. This entails that in order to complete from [e), the computation will have to 'pick' exactly one event from the cell. Cells represent choices. ...
doi:10.1016/j.entcs.2007.02.017
fatcat:ilzm35ogjzhr3kxweaevlz4jr4
TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware
[chapter]
2015
Lecture Notes in Computer Science
In this paper, we investigate a scenario based on the Trusted Cells paradigm : a user stores his personal data in a local secure data store and wants to process this data using MapReduce on a third party ...
The main contribution of the paper is to present TrustedMR, a trusted MapReduce system with high security assurance provided by tamper-resistant hardware, to enforce the security aspect of the MapReduce ...
Acknowledgement The authors wish to thank Nicolas Greneche from University of Paris Nord for his help in setting up the cluster for the experiment. ...
doi:10.1007/978-3-319-26148-5_3
fatcat:nsunishsirbudn24ujpn5l3hc4
Local Trust Versus Global Trust Networks in Subjective Logic
2013
2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)
Social web permits users to acquire information from anonymous people around the world. This leads to a serious question about the trustworthiness of information and sources. ...
Our proposed global trust model ensures a better performance thanks to its precise interpretation of the context of trust, and its ability to satisfy new arrived users. ...
mouth mechanism that allow the truster to acquire information about the trustee from his friends and theirs'. ...
doi:10.1109/wi-iat.2013.5
dblp:conf/webi/HaydarRB13
fatcat:vwyooh2kv5f3zflxrqginxmlk4
A Trust Framework for Peer-to-Peer Interaction in Ad Hoc Networks
2009
2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns
School of Electronics and Computer Science Doctor of Philosophy by Javesh Boodnah As a wider public is increasingly adopting mobile devices with diverse applications, the idea of who to trust while on ...
By design, the framework also houses a rule-based mechanism to thwart misbehaving behaviour or non-cooperation. ...
be actually trusted. ...
doi:10.1109/computationworld.2009.62
fatcat:vtoz27ksj5aqvpesmjei5by5ju
A Technique of Analyzing Trust Relationships to Facilitate Scientific Service Discovery and Recommendation
2013
2013 IEEE International Conference on Services Computing
We have established a Knowledge-Social-Trust (KST) network model to compute the trustworthiness of a service developer regarding specific user requirements and context. ...
As a proof of concept, a prototyping service has been developed to help scientists evaluate and visualize trust of services. The performance factor is studied and experience is reported. ...
This database can be later used as a mechanism to re-apply some calculations to the graph. ...
doi:10.1109/scc.2013.104
dblp:conf/IEEEscc/ZhangVLAKSNN13
fatcat:ybd4ejs3ujethn67j5q7bumy3m
SoK: Computer-Aided Cryptography
[article]
2019
IACR Cryptology ePrint Archive
Second, we distill the lessons learned from the computer-aided cryptography community's involvement in the TLS 1.3 standardization effort. ...
We present a cross-cutting systematization of the computer-aided cryptography literature, focusing on three main areas: (i) design-level security (both symbolic security and computational security), (ii ...
Computational tools have been used to develop machine-checked security proofs for a range of realworld cryptographic mechanisms. ...
dblp:journals/iacr/BarbosaBBBCLP19
fatcat:ky7xph7q3vfpxd2q2cfpybhw5e
SoK: Computer-Aided Cryptography
2021
2021 IEEE Symposium on Security and Privacy (SP)
Second, we distill the lessons learned from the computer-aided cryptography community's involvement in the TLS 1.3 standardization effort. ...
We present a cross-cutting systematization of the computer-aided cryptography literature, focusing on three main areas: (i) design-level security (both symbolic security and computational security), (ii ...
Computational tools have been used to develop machine-checked security proofs for a range of realworld cryptographic mechanisms. ...
doi:10.1109/sp40001.2021.00008
fatcat:hvor2dotoracledftqympf5ai4
« Previous
Showing results 1 — 15 out of 15,040 results