Skip to search formSkip to main contentSkip to account menu

Chain of trust

Known as: Trust chain 
In computer security, a chain of trust is established by validating each component of hardware and software from the bottom up. It is intended to… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
The Medical Device Coordination Framework (MDCF) is an open source middleware package for interoperable medical devices, designed… 
Review
2012
Review
2012
With the spread of mobile phones, through Wi-Fi and 3G communications, users have increased opportunities to retrieve messages… 
2011
2011
Aiming at the present problem that the trust information was not sufficient when processing the trust com-putation in trust link… 
2011
2011
An important problem in trust management area is to evaluate the trust value among two nodes in a web of trust using intermediate… 
2010
2010
  • Bin MuShijin Yuan
  • 2010
  • Corpus ID: 15550331
This paper aims to get initial trust value of direct trust and recommender trust. Firstly, we gives domain representations for… 
2010
2010
As an important feature, remote attestation was introduced in TCG specifications to attest whether a remote platform will behave… 
2010
2010
Wireless sensor networks (WSNs) are often deployed in unattended and hostile environments. In order to protect the sensitive data… 
2009
2009
In this paper we discuss a new architecture to reduce unsolicited e-mail messages. We propose a system architecture that… 
2007
2007
Facing ubiquitous threats like computer viruses, trojans and theft of intellectual property, Trusted computing (TC) is an… 
2006
2006
This is a pre-print version of a paper from Proceedings of the IASTED International Conference on Telehealth, 3-5 July 2006…