Trustworthy computing

The term Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available, and reliable. It is particularly… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
We present VC3, the first system that allows users to run distributed MapReduce computations in the cloud while keeping their… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2013
Highly Cited
2013
In this paper we propose Sancus, a security architecture for networked embedded devices. Sancus supports extensibility in the… (More)
  • figure 1
  • figure 3
  • table 1
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2011
Highly Cited
2011
This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • table 2
Is this relevant?
Highly Cited
2010
Highly Cited
2010
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new… (More)
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Grassroots Participatory Sensing empowers people to collect and share sensor data using mobile devices across many applications… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?
2007
2007
We present a system in which a user leverages a personal mobile device to establish trust on a public computing device, or kiosk… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2007
Highly Cited
2007
As computer systems become increasingly mission-critical, used in life-critical situations, and relied upon to protect… (More)
  • figure 1
Is this relevant?
2005
2005
Tamper-proof coprocessors for secure computing are poised to become a standard hardware feature on future computers. Such… (More)
  • figure 1
Is this relevant?
Review
2004
Review
2004
This paper discusses the trustworthy computing security development lifecycle (or simply the SDL), a process that Microsoft has… (More)
  • figure 1
Is this relevant?
2004
2004
The emerging paradigm of Web services has been gaining significant momentum in the recent years since it offers a promising way… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?