Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,757 papers from all fields of science
Search
Sign In
Create Free Account
Trustworthy computing
The term Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available, and reliable. It is particularly…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
6 relations
Code Red (computer worm)
Composability
Internet
Nimda
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
Towards Trustworthy Resource Scheduling in Clouds
I. Abbadi
,
Anbang Ruan
IEEE Transactions on Information Forensics and…
2013
Corpus ID: 14303834
Managing the allocation of cloud virtual machines at physical resources is a key requirement for the success of clouds. Current…
Expand
2013
2013
Thwarting DDoS attacks in grid using information divergence
P. Varalakshmi
,
S. Selvi
Future generations computer systems
2013
Corpus ID: 32298563
2010
2010
Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks
Mohammad Momani
,
S. Challa
,
R. Al-Hmouz
J. Networks
2010
Corpus ID: 13907107
This paper introduces a new Bayesian fusion algorithm to combine more than one trust component (data trust and communication…
Expand
2009
2009
Trust Model of Users' Behavior in Trustworthy Internet
L. Wen
,
Ping Ling-di
,
Lu Kuijun
,
C. Xiaoping
WASE International Conference on Information…
2009
Corpus ID: 15019001
As traditional network security cannot meet the security requirements, the international research shows that network security is…
Expand
2009
2009
Does trust influence information similarity
D. Lee
,
Peter Brusilovsky
ACM Conference on Recommender Systems
2009
Corpus ID: 13935979
In collaborative filtering recommender systems, users cannot get involved in the choice of their peer group. It leaves users…
Expand
2009
2009
Trustworthy knowledge diffusion model based on risk discovery on peer-to-peer networks
Jason J. Jung
Expert systems with applications
2009
Corpus ID: 38426157
2007
2007
A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network
Tianbao Li
2007
Corpus ID: 64340844
In recent years,the trustworthy network research has become a research focus.User trust study is one important branch of…
Expand
2007
2007
SOA-Trust: Towards Developing Trustworthy RFID Enabled Intelligent Service Solutions
Zongwei Luo
,
Jenny S. Li
,
Edward C. Wong
IEEE International Conference on e-Business…
2007
Corpus ID: 1580120
In this paper, we will introduce the concept of trustworthy Service Oriented Architecture (SOA) for enabling intelligent and yet…
Expand
Review
2006
Review
2006
Research on Network Architecture with Trustworthiness and Controllability
Chuang Lin
,
Xuehai Peng
Journal of Computational Science and Technology
2006
Corpus ID: 37744315
In this paper, the architecture of trustworthy and controllable networks is discussed to meet arising application requirements…
Expand
2004
2004
Secure routing in a vehicular ad hoc network
Stephan Eichler
,
Florian Dotzert
,
Christian SchwingenschlOgl
,
Francisco Javier Fabra Caro
,
Jorg Eberspacher
IEEE 60th Vehicular Technology Conference, . VTC…
2004
Corpus ID: 2265594
In the presence of attackers reliable and trustworthy operation of mobile ad hoc networks is impossible without secure routing…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE