Filters








15,040 Hits in 8.9 sec

Trusting Computations: a Mechanized Proof from Partial Differential Equations to Actual Program [article]

Sylvie Boldo, François Clément, Jean-Christophe Filliâtre (LRI, INRIA Saclay - Île-de-France), Micaela Mayero, Guillaume Melquiond (LRI, INRIA Saclay - Île-de-France), Pierre Weis
2014 arXiv   pre-print
In fact, we have gone much further as we have mechanically verified the convergence of the numerical scheme in order to get a complete formal proof covering all aspects from partial differential equations  ...  Computer programs may go wrong due to exceptional behaviors, out-of-bound array accesses, or simply coding errors. Thus, they cannot be blindly trusted.  ...  Acknowledgments We are grateful to Manuel Kauers, Veronika Pillwein, and Bruno Salvy, who provided us help with the nonnegativity of the fundamental solution of the discrete wave equation (Lemma 5.2).  ... 
arXiv:1212.6641v3 fatcat:h25wy4wfr5fm3orhck5qzsyjdu

Trusting computations: A mechanized proof from partial differential equations to actual program

Sylvie Boldo, François Clément, Jean-Christophe Filliâtre, Micaela Mayero, Guillaume Melquiond, Pierre Weis
2014 Computers and Mathematics with Applications  
In fact, we have gone much further as we have mechanically verified the convergence of the numerical scheme in order to get a complete formal proof covering all aspects from partial differential equations  ...  Computer programs may go wrong due to exceptional behaviors, out-of-bound array accesses, or simply coding errors. Thus, they cannot be blindly trusted.  ...  Acknowledgments We are grateful to Manuel Kauers, Veronika Pillwein, and Bruno Salvy, who provided us help with the nonnegativity of the fundamental solution of the discrete wave equation (Lemma 5.2).  ... 
doi:10.1016/j.camwa.2014.06.004 fatcat:5ahg2ixh3naolpl4pdm5u5fac4

Reputation-based trust management

Vitaly Shmatikov, Carolyn Talcott, Roberto Gorrieri
2005 Journal of Computer Security  
We propose a formal model for reputation-based trust management. In contrast to credential-based trust management, in our framework an agent's reputation serves as the basis for trust.  ...  For example, an access control policy may consider the agent's reputation when deciding whether to offer him a license for accessing a protected resource.  ...  Our types are intended to serve as the roots of a type hierarchy in any actual implementation of a trust management system based on our framework.  ... 
doi:10.3233/jcs-2005-13107 fatcat:qmolfaoeafc5lhi4hchcg7tpqq

Department of Defense Trusted Computer System Evaluation Criteria [chapter]

1985 The 'Orange Book' Series  
Trusted Path -A mechanism by which a person at a terminal can communicate directly with the Trusted Computing Base.  ...  The bounds of the TCB equate to the "security perimeter" referenced in some computer security literature.  ...  Exploitable Channel -Any channel that is useable or detectable by subjects external to the Trusted Computing Base.  ... 
doi:10.1007/978-1-349-12020-8_1 fatcat:nudeck4dp5ek5gkcflpbmsmgqq

Computing across Trust Boundaries using Distributed Homomorphic Cryptography [article]

Christian Mouchet, Juan Ramón Troncoso-Pastoriza, Jean-Pierre Hubaux
2019 IACR Cryptology ePrint Archive  
Hence, this work constitutes a step forward in secure computation, by enabling computation across trust boundaries.  ...  We approach SMC as a computational problem and propose a novel formulation of this problem in terms of trust boundaries.  ...  ACKNOWLEDGMENTS The authors would like to thank Jean-Philippe Bossuat for the implementation of the distributed cryptosystem, and all those who provided the valuable reviews and comments.  ... 
dblp:journals/iacr/MouchetTH19 fatcat:ueaxwchh7ndyhl7q3nmlolkgim

Fully Countering Trusting Trust through Diverse Double-Compiling [article]

David A. Wheeler
2010 arXiv   pre-print
This dissertation's thesis is that the trusting trust attack can be detected and effectively countered using the "Diverse Double-Compiling" (DDC) technique, as demonstrated by (1) a formal proof that DDC  ...  An Air Force evaluation of Multics, and Ken Thompson's Turing award lecture ("Reflections on Trusting Trust"), showed that compilers can be subverted to insert malicious Trojan horses into critical software  ...  actually run by the computer 1 .  ... 
arXiv:1004.5534v1 fatcat:s7p77pfwonfjpbq3cjscwp6k6q

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
When two or more parties need to compute a common result while safeguarding their sensitive inputs, they use secure multiparty computation (SMC) techniques such as garbled circuits.  ...  This paper also addresses three open challenges: (1) defeating malicious adversaries, (2) mobile-friendly TEE-supported SMC, and (3) a more general coupling of trusted hardware and privacy-preserving computation  ...  Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

A trust model in cloud computing based on fuzzy logic

Ritu, Sushma Jain
2016 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT)  
In cloud computing, trust helps the consumer to choose the service of a cloud provider for storing and processing their sensitive information.  ...  It is common to hear organizations-big or small are moving to cloud computing for its scalability and cost savings. But, how do you decide which cloud provider to trust?  ...  • Trust Model in Mobile ad-Hoc Theodorakopoulos and Baras [35] have introduced a trust model to compute the trust proofs in ad-hoc networks. The evidences of trust were unsure and partial.  ... 
doi:10.1109/rteict.2016.7807780 fatcat:z5f5enwbgnchngmjdatgksnoue

A Bayesian Model for Event-based Trust

Mogens Nielsen, Karl Krukow, Vladimiro Sassone
2007 Electronical Notes in Theoretical Computer Science  
One alternative currently being investigated is to support security decision-making by explicit representation of principals' trusting relationships, i.e., via systems for computational trust.  ...  Using it, we compare some of the systems from the computational trust literature; the comparison is derived formally, rather than obtained via experimental simulation as traditionally done.  ...  A maximal partial cell is called a cell. This entails that in order to complete from [e), the computation will have to 'pick' exactly one event from the cell. Cells represent choices.  ... 
doi:10.1016/j.entcs.2007.02.017 fatcat:ilzm35ogjzhr3kxweaevlz4jr4

TrustedMR: A Trusted MapReduce System Based on Tamper Resistance Hardware [chapter]

Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral
2015 Lecture Notes in Computer Science  
In this paper, we investigate a scenario based on the Trusted Cells paradigm : a user stores his personal data in a local secure data store and wants to process this data using MapReduce on a third party  ...  The main contribution of the paper is to present TrustedMR, a trusted MapReduce system with high security assurance provided by tamper-resistant hardware, to enforce the security aspect of the MapReduce  ...  Acknowledgement The authors wish to thank Nicolas Greneche from University of Paris Nord for his help in setting up the cluster for the experiment.  ... 
doi:10.1007/978-3-319-26148-5_3 fatcat:nsunishsirbudn24ujpn5l3hc4

Local Trust Versus Global Trust Networks in Subjective Logic

Charif Haydar, Azim Roussanaly, Anne Boyer
2013 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT)  
Social web permits users to acquire information from anonymous people around the world. This leads to a serious question about the trustworthiness of information and sources.  ...  Our proposed global trust model ensures a better performance thanks to its precise interpretation of the context of trust, and its ability to satisfy new arrived users.  ...  mouth mechanism that allow the truster to acquire information about the trustee from his friends and theirs'.  ... 
doi:10.1109/wi-iat.2013.5 dblp:conf/webi/HaydarRB13 fatcat:vwyooh2kv5f3zflxrqginxmlk4

A Trust Framework for Peer-to-Peer Interaction in Ad Hoc Networks

Javesh Boodnah, Stefan Poslad
2009 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns  
School of Electronics and Computer Science Doctor of Philosophy by Javesh Boodnah As a wider public is increasingly adopting mobile devices with diverse applications, the idea of who to trust while on  ...  By design, the framework also houses a rule-based mechanism to thwart misbehaving behaviour or non-cooperation.  ...  be actually trusted.  ... 
doi:10.1109/computationworld.2009.62 fatcat:vtoz27ksj5aqvpesmjei5by5ju

A Technique of Analyzing Trust Relationships to Facilitate Scientific Service Discovery and Recommendation

Jia Zhang, Petr Votava, Tsengdar J. Lee, Shrikant Adhikarla, Isaraporn Cherry Kulkumjon, Matthew Schlau, Divya Natesan, Ramakrishna Nemani
2013 2013 IEEE International Conference on Services Computing  
We have established a Knowledge-Social-Trust (KST) network model to compute the trustworthiness of a service developer regarding specific user requirements and context.  ...  As a proof of concept, a prototyping service has been developed to help scientists evaluate and visualize trust of services. The performance factor is studied and experience is reported.  ...  This database can be later used as a mechanism to re-apply some calculations to the graph.  ... 
doi:10.1109/scc.2013.104 dblp:conf/IEEEscc/ZhangVLAKSNN13 fatcat:ybd4ejs3ujethn67j5q7bumy3m

SoK: Computer-Aided Cryptography [article]

Manuel Barbosa, Gilles Barthe, Karthikeyan Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
2019 IACR Cryptology ePrint Archive  
Second, we distill the lessons learned from the computer-aided cryptography community's involvement in the TLS 1.3 standardization effort.  ...  We present a cross-cutting systematization of the computer-aided cryptography literature, focusing on three main areas: (i) design-level security (both symbolic security and computational security), (ii  ...  Computational tools have been used to develop machine-checked security proofs for a range of realworld cryptographic mechanisms.  ... 
dblp:journals/iacr/BarbosaBBBCLP19 fatcat:ky7xph7q3vfpxd2q2cfpybhw5e

SoK: Computer-Aided Cryptography

Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno
2021 2021 IEEE Symposium on Security and Privacy (SP)  
Second, we distill the lessons learned from the computer-aided cryptography community's involvement in the TLS 1.3 standardization effort.  ...  We present a cross-cutting systematization of the computer-aided cryptography literature, focusing on three main areas: (i) design-level security (both symbolic security and computational security), (ii  ...  Computational tools have been used to develop machine-checked security proofs for a range of realworld cryptographic mechanisms.  ... 
doi:10.1109/sp40001.2021.00008 fatcat:hvor2dotoracledftqympf5ai4
« Previous Showing results 1 — 15 out of 15,040 results