Search results
Create the page "Trustworthy Computing" on this wiki! See also the search results found.
- pervasive and ubiquitous computing, and trust management are just a * Privacy and Security in trustworthy databases9 KB (1,189 words) - 13:53, 28 August 2008
- | Title = The 6th International Conference on Autonomic and Trusted Computing The 6th International Conference on Autonomic and Trusted Computing (ATC-09)9 KB (1,216 words) - 16:32, 14 October 2008
- | Title = 4th International Conference on Collaborative Computing The 4th International Conference on Collaborative Computing:6 KB (674 words) - 21:45, 14 October 2008
- and trustworthy of information are also significant requirements in computing data, grid computing data etc.7 KB (908 words) - 22:10, 14 October 2008
- | Title = The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing The 4th International Conference on Collaborative Computing:8 KB (1,093 words) - 22:15, 14 October 2008
- ...E International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing602 bytes (67 words) - 22:15, 14 October 2008
- | Field = Distributed computing | of the 24th ACM Symposium on Applied Computing (SAC'09) |8 KB (952 words) - 22:31, 14 October 2008
- ...a mining; Data confidentiality and integrity; Information flow protection; Trustworthy networks: authentication, privacy and security models; Secure service disco ** [[has PC member::Anders Moen Hagalisletto]], Norwegian Computing Center / University of Oslo, Norway13 KB (1,617 words) - 18:03, 24 November 2008
- ...digm/; Recovering and fault-tolerance; In-network processing; Distributing computing /autonomic, on-demand, cloud/etc./; Context-aware and context recognition; ...y-tolerant IP networks; Trustworthy Internet; Mobile computing; Ubiquitous computing; Reliability; Resilience; Scalability; User and service mobility; Wireless7 KB (883 words) - 16:35, 7 January 2021
- ...f cell phones. Today, the mobile phone has become the most widely deployed computing platform in the world. Analysts predict some 2.6 billion mobile phones in r That is, how can mobile devices act as a trustworthy interface to the digital world?11 KB (1,539 words) - 12:02, 18 January 2009
- * Privacy-Preserving Computing * Trustworthy Computing2 KB (229 words) - 15:33, 27 February 2009
- ...es reliance on the guarantee of service level agreement for satisfying the computing needs of users, without them needing knowledge of, expertise with, or contr ...s that link adaptability of Web services to the paradigm of SaaS and cloud computing. In additional to the topics covered in the previous workshops, we also enc6 KB (855 words) - 16:06, 27 February 2009
- be resilient to failures and malicious attacks, and be trustworthy for -Ubiquitous Computing Applications11 KB (1,440 words) - 16:08, 27 February 2009
- - privacy and ubiquitous computing, e.g. RFIDs - wireless and pervasive/ubiquitous computing security12 KB (1,690 words) - 16:08, 27 February 2009
- ...for online marketing. Trust is a social concept that happens in society. A trustworthy person gains trust during time thanks to its behaviour in the virtual socie * Anonymity and privacy-aware solutions for Social computing logs mining4 KB (600 words) - 18:11, 18 February 2010
- * Trustworthy computing4 KB (490 words) - 13:42, 6 November 2020
- |Title=1 st International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS) Conference Name: 1st International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)8 KB (1,066 words) - 18:39, 8 July 2010
- |Title=2nd International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS) Conference Name: 2nd International Conference on Pervasive and Embedded Computing and Communication Systems (PECCS)4 KB (463 words) - 10:41, 1 July 2011
- |Title=5th International Conference on Trust and Trustworthy Computing |Field=Trustworthy Computing4 KB (451 words) - 11:27, 30 November 2011
- ...security challenges that have to be addressed in order to provide secure, trustworthy, and privacy-preserving data communication and network services. Second, la4 KB (581 words) - 17:48, 24 February 2020