Zobrazeno 1 - 10
of 79
pro vyhledávání: '"David Grawrock"'
Publikováno v:
EURASIP Journal on Information Security, Vol 2019, Iss 1, Pp 1-22 (2019)
Abstract Many applications are built upon private algorithms, and executing them in untrusted, remote environments poses confidentiality issues. To some extent, these problems can be addressed by ensuring the use of secure hardware in the execution e
Externí odkaz:
https://doaj.org/article/f263be4e846342e698800c7ac859ede5
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319283128
Trust Evidence addresses the problem of how devices or systems should mutually assess trustworthiness at the onset and during interaction. Approaches to Trust Evidence can be used to assess risk, for example, facilitating the choice of threat posture
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::78edcb336330b6e5d6d58216a4fe1156
https://doi.org/10.1007/978-3-319-28313-5_3
https://doi.org/10.1007/978-3-319-28313-5_3
Publikováno v:
ISSE 2015 ISBN: 9783658109332
ISSE
ISSE
Trust Evidence provides a framework for demonstrating the trustworthiness of a device, a system, or a service, a key requirement in managing risk within interactions associated with a broad spectrum of electronic processes (sensor networks, data anal
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6b460398f2e08094fa9ed12439b3e548
https://doi.org/10.1007/978-3-658-10934-9_11
https://doi.org/10.1007/978-3-658-10934-9_11
Autor:
David Grawrock
Publikováno v:
EDPACS. 26:1-5
The use of laptop microcomputers continues to grow. So does the loss that is associated with this use. the real cost of losing a laptop microcomputer matters both to individuals and to organizations. the data that is on laptop microcomputers belongs
Publikováno v:
ISSE 2012 Securing Electronic Business Processes ISBN: 9783658003326
ISSE
ISSE
When technologists develop trust, security and privacy features in devices, applications, networks, and systems, they plan for certain functionality and outcomes. Early stages of planning include threat modelling, vulnerability analysis as well as fo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e1885e5cfda779bf98f47f7e098e257a
https://doi.org/10.1007/978-3-658-00333-3_23
https://doi.org/10.1007/978-3-658-00333-3_23
Publikováno v:
CSIIRW
Publikováno v:
Trust and Trustworthy Computing ISBN: 9783642215988
TRUST
TRUST
One critical aspect of a secure hardware design is the ability to measure a design's security. In this paper, we propose a hardware security assessment scheme that provides a systematic way of measuring and categorizing a hardware feature's security
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::58679f8e51473892389ac0db6c738eb3
https://doi.org/10.1007/978-3-642-21599-5_12
https://doi.org/10.1007/978-3-642-21599-5_12
Publikováno v:
Trusted Computing ISBN: 9783834803092
Trusted Computing has been widely recognized as a useful and necessary extension of more traditional security mechanisms. In today’s complex multi-device environment, it is essential to be assured that devices participating in transactions can be t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe519ddcecbfe227e04b6a005b8bc145
https://doi.org/10.1007/978-3-8348-9452-6_4
https://doi.org/10.1007/978-3-8348-9452-6_4
Several constituencies are working on building and preserving users'trust in the digital economy through - are examining new behaviors associated with ubiquitous connectivity and mobile computing as wel- hance privacy using new technologies and proce
Publikováno v:
ISSE 2015; 2015, p121-131, 11p