Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Trustworthy computing

The term Trustworthy Computing (TwC) has been applied to computing systems that are inherently secure, available, and reliable. It is particularly… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
As qualitative research becomes increasingly recognized and valued, it is imperative that it is conducted in a rigorous and… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 4
Is this relevant?
Review
2017
Review
2017
The problem of malicious activities in online social networks, such as Sybil attacks and malevolent use of fake identities, can… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2015
Highly Cited
2015
We present VC3, the first system that allows users to run distributed MapReduce computations in the cloud while keeping their… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Drawing on social learning and moral identity theories, this research examines antecedents and consequences of ethical leadership… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • figure 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
For reasons of economy, critical systems will inevitably depend on electronics made in untrusted factories. A proposed new… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Hero or villain? Trustworthy guardian of normal homeostasis or double agent? Over the past two decades, the perceived role of… Expand
  • figure 1
Is this relevant?
Highly Cited
2003
Highly Cited
2003
A recent and dramatic increase in the use of automation has not yielded comparable improvements in performance. Researchers have… Expand
Is this relevant?
Highly Cited
2002
Highly Cited
2002
For agents to function effectively in large and open networks, they must ensure that their correspondents, i.e., the agents they… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
1998
Highly Cited
1998
In many approaches to interpersonal and organizational trust, researchers focus on employees' perceptions that their managers are… Expand
Is this relevant?
Highly Cited
1997
Highly Cited
1997
  • M. Yeung, F. Mintzer
  • Proceedings of International Conference on Image…
  • 1997
  • Corpus ID: 2208074
We propose a new method for invisibly watermarking high-quality color and gray-scale images. This method is intended for use in… Expand
  • figure 1
  • figure 5
  • figure 4
  • figure 2
  • figure 3
Is this relevant?