Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,429,563 papers from all fields of science
Search
Sign In
Create Free Account
Trust anchor
Known as:
Root of Trust
In cryptographic systems with hierarchical structure, a trust anchor is an authoritative entity for which trust is assumed and not derived. In X.509…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
Certification path validation algorithm
Chain of trust
Cryptography
Domain Name System Security Extensions
Expand
Broader (1)
Key management
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Practical Verifiable In-network Filtering for DDoS Defense
D. Gong
,
Muoi Tran
,
+4 authors
M. Kang
IEEE International Conference on Distributed…
2019
Corpus ID: 57572934
In light of ever-increasing scale and sophistication of modern distributed denial-of-service (DDoS) attacks, recent proposals…
Expand
2018
2018
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet
B. Lapid
,
A. Wool
European Symposium on Research in Computer…
2018
Corpus ID: 51983672
The ARM TrustZone is a security extension helping to move the “root of trust” further away from the attacker, which is used in…
Expand
2013
2013
Defense-in-Depth Against Malicious Insiders in the Cloud
F. Rocha
,
Thomas Gross
,
A. Moorsel
IEEE International Conference on Cloud…
2013
Corpus ID: 15091330
A critical challenge in cloud computing is assuring confidentiality and integrity for the execution of arbitrary software in a…
Expand
2010
2010
Evil maid goes after PGP whole disk encryption
A. Tereshkin
International Conference on Security of…
2010
Corpus ID: 29070358
Full disk encryption systems are widely used to protect the information from unauthorized access. A common application of such…
Expand
2007
2007
A technical architecture for enforcing usage control requirements in service-oriented architectures
B. Agreiter
,
Muhammad Alam
,
+4 authors
Xinwen Zhang
Secure Web Services
2007
Corpus ID: 790092
We present an approach to modeling and enforcing usage control requirements on remote clients in service-oriented architectures…
Expand
2007
2007
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Jeffrey S. Dwoskin
,
Dahai Xu
,
Jianwei Huang
,
M. Chiang
,
R. Lee
IEEE GLOBECOM - IEEE Global Telecommunications…
2007
Corpus ID: 8602174
In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node…
Expand
2006
2006
Towards an open, trusted digital rights management platform
Andrew Cooper
,
Andrew P. Martin
ACM Digital Rights Management Workshop
2006
Corpus ID: 12381829
Trusted computing has received criticism from those who fear it will be used by influential market forces to exert power over the…
Expand
2006
2006
Rapid Trust Establishment for Transient Use of Unmanaged Hardware
Ajay Surie
,
A. Perrig
,
M. Satyanarayanan
,
D. Farber
2006
Corpus ID: 2340973
Abstract : Transient use of PCs has grown in importance with the advent of Internet cafes and the emergence of personalization…
Expand
2005
2005
Analysis of Trust Properties and Related Impact of Trusted Platforms
Siani Pearson
,
M. C. Mont
,
S. Crane
,
S. Crane
2005
Corpus ID: 14200114
This paper draws a distinction between persistent and dynamic trust and analyses this distinction within the context of trusted…
Expand
2002
2002
A Proposal for Trust Model: Independent Trust Intermediary Service (ITIS)
Mingchao Ma
,
C. Meinel
International Conference WWW/Internet
2002
Corpus ID: 5862466
Reliable, distributed applications based on Internet, such as e-commerce system rely heavily on trust path among involved parties…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE