Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Chain of trust

Known as: Trust chain 
In computer security, a chain of trust is established by validating each component of hardware and software from the bottom up. It is intended to… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
We develop and analyze a trust management protocol for mission-driven group communication systems in mobile ad hoc networks using… Expand
  • figure 1
  • figure 3
  • table 1
  • table 2
  • figure 6
Is this relevant?
2011
2011
Aiming at the present problem that the trust information was not sufficient when processing the trust com-putation in trust link… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
The main difference between cloud computing and traditional enterprise internal IT services is that the owner and the user of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Credential chains are needed in trusted peer-to-peer (P2P) applications, where trust delegation must be established between each… Expand
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
2009
2009
The World Wide Web has transformed into an environment where users both produce and consume information. In order to judge the… Expand
  • table 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2009
Highly Cited
2009
We develop and analyze a trust management protocol for cognitive mission-driven group communication systems (GCSs) in mobile ad… Expand
  • figure 1
  • figure 3
  • table 1
  • table 2
  • figure 5
Is this relevant?
Highly Cited
2008
Highly Cited
2008
For the last few years, many commodity computers have come equipped with a Trusted Platform Module (TPM). Existing research shows… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In this paper we describe bugs and ways to attack trusted computing systems based on a static root of trust such as Microsoft's… Expand
  • figure 2
  • figure 4
  • figure 5
Is this relevant?
2005
2005
In this paper we discuss the analysis of trusted platform communication. While the trusted platform module itself is considered… Expand
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Psychologists have emphasized children's acquisition of information through first-hand observation. However, many beliefs are… Expand
  • table 1
  • table 2
Is this relevant?