Results 1 - 10
of
130
Trust and Privacy Permissions for an Ambient World. In: Intelligent Information Technologies: Concepts, Methodologies, Tools, and Applications.
- University of London.
, 2007
"... TRUST AND PRIVACY PERMISSIONS FOR AN AMBIENT WORLD Ambient Intelligence (AmI) and ubiquitous computing allow us to consider a future where computation is embedded into our daily social lives. This vision raises its own important questions and augments the need to understand how people will trust su ..."
Abstract
-
Cited by 8 (5 self)
- Add to MetaCart
to and the nature of the information disclosed. For example, Cranor, Fears related to online privacy stem from the technologies' ability to monitor and record every aspect of the user's behaviour The value of such information increases as more data is collected. used. Choice means individuals have
location privacy based on trusted computing and secure logging
- In Proc. of the 4th SecureComm
, 2008
"... Many operators of cellphone networks now offer locationbased services to their customers, whereby an operator often outsources service provisioning to a third-party provider. Since a person’s location could reveal sensitive information about the person, the operator must ensure that the service prov ..."
Abstract
-
Cited by 5 (2 self)
- Add to MetaCart
location information to the service only if the service is configured such that the service provider cannot get access to location information using software-based attacks. This includes passive attacks, where the provider monitors information flowing into and out of its service, and active attacks, where
Towards Multi-Layer Trusted Virtual Domains
- The 2nd Workshop on Advances in Trusted Computing
, 2006
"... We address the fine-grained control of information flow between distributed applications to protect transactions. Confining transactions in distributed untrusted environments is crucial for Web services, distributed computing, and most e-commerce applications relying on those technologies. Applicati ..."
Abstract
-
Cited by 4 (0 self)
- Add to MetaCart
We address the fine-grained control of information flow between distributed applications to protect transactions. Confining transactions in distributed untrusted environments is crucial for Web services, distributed computing, and most e-commerce applications relying on those technologies
CPEF: A continuous planning and execution framework
- AI Magazine
, 1999
"... s This article reports on the first phase of the continuous planning and execution framework (CPEF), a system that employs sophisticated plan-generation, -execution, -monitoring, and -repair capabilities to solve complex tasks in unpredictable and dynamic environments. CPEF embraces the philosophy ..."
Abstract
-
Cited by 70 (3 self)
- Add to MetaCart
that plans are dynamic, open-ended artifacts that must evolve in response to an ever-changing environment. In particular, plans and activities are updated in response to new information and requirements to ensure that they remain viable and relevant. Users are an integral part of the process, providing input
Enhancing Security in Cyber Physical Systems through Policy based Trust Management against Deception Attack
"... The World is moving towards invisible computers, Ubiquitous Computing (any information everywhere), Pervasive Computing (which combines current network technology with wireless computing), Ambient Intelligence (which refers to electronic environments that are sensitive and responsive to the presence ..."
Abstract
- Add to MetaCart
with monitoring and/or control of entities in physical world. CPS is the integration of several Wireless Sensor Networks.CPS is used in several applications like Automotive electronics, Avionics, Medical systems, Forestry machines, Logistics, Autonomous Vehicles, and
Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques
"... We present the design of a trusted platform module (TPM) that supports hardware-based virtualization techniques. Our approach enables multiple virtual machines to use the complete power of a hardware TPM by providing for every virtual machine (VM) the illusion that it has its own hardware TPM. For t ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
. For this purpose, we introduce an additional privilege level that is only used by a virtual machine monitor to issue management commands, such as scheduling commands, to the TPM. Based on a TPM Control Structure, we can ensure that state information of a virtual machine’s TPM cannot corrupt the TPM state
Realizing the Promise: Government Information Systems and the Fourth Generation of Information Technology
- Public Administration Review
, 2001
"... Interoperability is more than "digital plumbing"-making sure that computers talk so that bits of data flow properly. Fundamentally, interoperability is people talking and sharing information. Sharing information reduces the "paperwork burden" on the citizen, streamlines work pro ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
and bytes to flow properly-fundamentally, the goal of interoperability is the much more difficult problem of getting people and organizations to share information in an information-technology environment. To really understand the possibilities, it is important to see the big picture of the opportunities
USE OF GIS METHODOLOGY FOR ONLINE URBAN TRAFFIC MONITORING
"... Main goal of traffic management is the optimisation of traffic flow. This aim is based on possession of precise traffic describing data and parameters. Two dimensional traffic data acquisition becomes a research emphasis of German Aerospace Center (DLR)s Institute of Transport Research to improve th ..."
Abstract
- Add to MetaCart
. An open interface ensures a multi-facetted utilization of the information by multiple user groups. The data processing is based on a commercially available digital map. Practical tests showed that the quality of traffic flow data extraction will increase significantly by improving the digital map basis
flow controls, Security kernels
"... Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted data paths across distributed machines, for the services being run and their information exchanges. For trusted data paths, ..."
Abstract
- Add to MetaCart
Protecting shared sensitive information is a key requirement for today’s distributed applications. Our research uses virtualization technologies to create and maintain trusted data paths across distributed machines, for the services being run and their information exchanges. For trusted data paths
BUILDING A FRAMEWORK FOR INFORMATION FLOW AWARE WEB APPLICATIONS
, 2008
"... iii Web has profoundly changed the way people share information and is being used exten-sively by organizations to share sensitive information. For such distributed web-based environ-ments, multilevel classification of information has become an essential requirement. Information flow policies that e ..."
Abstract
- Add to MetaCart
that ensure multilevel classification of information are cur-rently being enforced independently at different layers in a distributed system using technolo-gies such as mandatory access control based operating systems and security-typed languages. In this thesis, we focus on designing a framework to unify
Results 1 - 10
of
130