1995
DOI: 10.1016/0167-4048(95)97026-7
|View full text |Cite
|
Sign up to set email alerts
|

Trusted computing update

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2000
2000
2011
2011

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 4 publications
0
9
0
Order By: Relevance
“…A trustor trusts a trustee to use resources that he owns or controls, which could be a software execution environment or an application service [35][36][37]. Abrams and Joyce [35] highlight the fact that resource access trust has been the focus for security specialists for many decades, although the emphasis has mostly been on mechanisms supporting access control.…”
Section: Access To a Trustor's Resourcesmentioning
confidence: 99%
See 2 more Smart Citations
“…A trustor trusts a trustee to use resources that he owns or controls, which could be a software execution environment or an application service [35][36][37]. Abrams and Joyce [35] highlight the fact that resource access trust has been the focus for security specialists for many decades, although the emphasis has mostly been on mechanisms supporting access control.…”
Section: Access To a Trustor's Resourcesmentioning
confidence: 99%
“…In [35,36], the authors implicitly map trust decisions to access control decisions. Generally, resource access trust can form the basis for specifying authorisation policy, which then is implemented using operating system or database access control mechanisms, firewall rules etc.…”
Section: Access To a Trustor's Resourcesmentioning
confidence: 99%
See 1 more Smart Citation
“…authorize or inherit) tasks on behalf of others. Finally Infrastructure Trust refers to trust provided by infrastructures or circumstances ( [53], [54], [55]), where the concept is not rather than context-based trust. All of these are considered properties that have significant impact on trust of a target, but not considered trust classification in our respect.…”
Section: Trust Classificationmentioning
confidence: 99%
“…Some known to authors initial attempts by commercial risk management companies to create an operational and risk evaluation model for Grids has not been resulted in something more than attempts to frame Grid security model into the standard IT security models which are inheritingly built either using Internet/OSI security model or Common Criteria [14] based on the Trusted Computing Base model [15].…”
Section: Grid Operational Security Practicementioning
confidence: 99%