Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,217,330 papers from all fields of science
Search
Sign In
Create Free Account
Chain of trust
Known as:
Trust chain
In computer security, a chain of trust is established by validating each component of hardware and software from the bottom up. It is intended to…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Backup
Certificate authority
Computer hardware
Cryptographic hash function
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Retrofitting Communication Security into a Publish/Subscribe Middleware Platform
Carlos Salazar
,
Eugene Y. Vasserman
FHIES/SEHC
2014
Corpus ID: 8732315
The Medical Device Coordination Framework (MDCF) is an open source middleware package for interoperable medical devices, designed…
Expand
Review
2012
Review
2012
Mobile social network based trust authentication
You Lu
,
K. Su
,
J. Weng
,
M. Gerla
The 11th Annual Mediterranean Ad Hoc Networking…
2012
Corpus ID: 7566666
With the spread of mobile phones, through Wi-Fi and 3G communications, users have increased opportunities to retrieve messages…
Expand
2011
2011
Trust chain management model based on recommendation
Junfeng Tian
,
Yuzhen Lu
,
Li Ning
2011
Corpus ID: 63565602
Aiming at the present problem that the trust information was not sufficient when processing the trust com-putation in trust link…
Expand
2011
2011
Computing trust resultant using intervals
Hassan Shakeri
,
Abbas Ghaemi Bafghi
,
Hadi Sadoghi Yazdi
8th International ISC Conference on Information…
2011
Corpus ID: 18446014
An important problem in trust management area is to evaluate the trust value among two nodes in a web of trust using intermediate…
Expand
2010
2010
A method for evaluating initial trust value of direct trust and recommender trust
Bin Mu
,
Shijin Yuan
International Conference On Computer Design and…
2010
Corpus ID: 15550331
This paper aims to get initial trust value of direct trust and recommender trust. Firstly, we gives domain representations for…
Expand
2010
2010
RABBIF: Remote Attestation Based on Behavior and Information Flow
Jian Wang
,
Haihang Wang
,
Chengxiang Tan
Second International Conference on Computer…
2010
Corpus ID: 18530502
As an important feature, remote attestation was introduced in TCG specifications to attest whether a remote platform will behave…
Expand
2010
2010
A key management scheme in wireless sensor networks based on Behavior Trust
Tao Liu
,
Ming-zheng Zhou
IEEE International Conference on Progress in…
2010
Corpus ID: 16822738
Wireless sensor networks (WSNs) are often deployed in unattended and hostile environments. In order to protect the sensitive data…
Expand
2009
2009
Trustnet Architecture for E-mail Communication
David Pölz
,
W. Gansterer
20th International Workshop on Database and…
2009
Corpus ID: 5777301
In this paper we discuss a new architecture to reduce unsolicited e-mail messages. We propose a system architecture that…
Expand
2007
2007
Establishing Chain of Trust in Reconfigurable Hardware
T. Eisenbarth
,
Tim Güneysu
,
C. Paar
,
A. Sadeghi
,
M. Wolf
,
R. Tessier
IEEE Symposium on Field-Programmable Custom…
2007
Corpus ID: 13158365
Facing ubiquitous threats like computer viruses, trojans and theft of intellectual property, Trusted computing (TC) is an…
Expand
2006
2006
Secure federated data retrieval in clinical trials
A. Stell
,
R. Sinnott
,
O. Ajayi
2006
Corpus ID: 16286686
This is a pre-print version of a paper from Proceedings of the IASTED International Conference on Telehealth, 3-5 July 2006…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE