Enhancing the privacy of network services through trusted computing

D Zhang, L Ren, Z Gu - Applied Sciences, 2022 - mdpi.com
The addressing and discovering service is a vital infrastructure of the Internet. New
applications and scenarios in next-generation networks rely on the secure and stable …

SAFE: A declarative trust management system with linked credentials

V Thummala, J Chase - arXiv preprint arXiv:1510.04629, 2015 - arxiv.org
We present SAFE, an integrated system for managing trust using a logic-based declarative
language. Logical trust systems authorize each request by constructing a proof from a …

A survey of trusted network trust evaluation methods

AS Yin, SY Zhang - Security and Privacy in New Computing Environments …, 2019 - Springer
The proposed trusted network is respond to the increasingly prominent internal network
security threats. At present, research on trusted networks focuses on two aspects: pre …

Domain name service trust delegation in cloud computing: exploitation, risks, and defense

C Laprade, HH Huang - Proceedings of the 37th ACM/SIGAPP …, 2022 - dl.acm.org
The Domain Name Service (DNS) infrastructure is a global distributed database that links
human readable names with the Internet Protocol (IP) addresses of the resources that power …

Trust domain based trustworthy networking

BO Kwak, TS Chung - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
The current Internet allows vulnerable anonymous attackers to masquerade as legitimate
users, making them susceptible to various malicious attacks such as spoofing or denial of …

Satem: Trusted service code execution across transactions

G Xu, C Borcea, L Iftode - 2006 25th IEEE Symposium on …, 2006 - ieeexplore.ieee.org
Web services and service oriented architectures are becoming the de facto standard for
Internet computing. A main problem faced by users of such services is how to ensure that the …

Recent advances on trusted computing in China

W Dong, LQ Chen - Chinese Science Bulletin, 2012 - Springer
This article highlights some recent research advances on trusted computing in China,
focusing mainly on the methodologies and technologies related to trusted computing …

Metered Boot: Trusted Framework for Application Usage Rights Management in Virtualized Ecosystems

A Raghuramu, L Cao, P Sharma… - … on Network and …, 2022 - ieeexplore.ieee.org
The adoption of virtualization and cloud computing technologies have revolutionized how
services and applications can be developed, deployed, and operated to achieve better …

Design and implementation of trust domain gateway system

BO Kwak, TS Chung - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Trust networking technology is a trust infrastructure construction technology that enables
nodes with mutual trust to autonomously construct trust domains and expand them through …

Satem: Trusted service code execution across transactions

S Shrivastava - 2006 25th IEEE Symposium on Reliable Distributed …, 2006 - computer.org
Web services and service oriented architectures are becoming the de facto standard for
Internet computing. A main problem faced by users of such services is how to ensure that the …