Abstract. In the near future, computing devices will be present in most artefacts, will considerably outnumber the number of people on this planet, and will host software the executes in a potentially hostile and only partially known environment. This suggests the need for bringing trust management into running software itself, so that executing soft-ware be guard-railed by policies that reflect risk postures deemed to be appropriate for software and its deployment context. We sketch here an implementation of a prototype that realizes, in part, such a vision. The technical work described below relies on the concept of Trust Evidence. By this we mean any source of information (credentials, reputation, system state, past or present behavior, ...
International audienceTrust in computer science mostly relies on evaluating the risks of using a too...
As the complexity of current software systems increases, we see a correlative increase in the number...
Trust is essential for further and wider acceptance of contemporary e-services. It was first address...
The need for trustworthy system operation has been acknowledged in many circles. However, establishi...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
This paper extends the software trustworthiness evidence framework to include the runtime software t...
Abstract. Programmers develop code with a sense of purpose and with expectations on how units of cod...
Trust is an absolute necessity for digital communications; but is often viewed as an implicit singul...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
The last years have seen a number of proposals to incorporate Security Engineering into mainstream S...
This dissertation contributes to a relatively young field in computer science research, the field of...
Abstract. The last years have seen a number of proposals to incorpo-rate Security Engineering into m...
In performing various tasks we often rely on others. While driving, we trust the manufacturer to pro...
Abstract—Trustworthiness of software and services is a key concern for their use and adoption by org...
Abstract. Software component technology supports the cost-effective design of applications suited to...
International audienceTrust in computer science mostly relies on evaluating the risks of using a too...
As the complexity of current software systems increases, we see a correlative increase in the number...
Trust is essential for further and wider acceptance of contemporary e-services. It was first address...
The need for trustworthy system operation has been acknowledged in many circles. However, establishi...
This paper presents a new concept of an approach to risk assessment which can be done on the basis o...
This paper extends the software trustworthiness evidence framework to include the runtime software t...
Abstract. Programmers develop code with a sense of purpose and with expectations on how units of cod...
Trust is an absolute necessity for digital communications; but is often viewed as an implicit singul...
. This paper proposes a model for quantifying and reasoning about trust in IT equipment. Trust is co...
The last years have seen a number of proposals to incorporate Security Engineering into mainstream S...
This dissertation contributes to a relatively young field in computer science research, the field of...
Abstract. The last years have seen a number of proposals to incorpo-rate Security Engineering into m...
In performing various tasks we often rely on others. While driving, we trust the manufacturer to pro...
Abstract—Trustworthiness of software and services is a key concern for their use and adoption by org...
Abstract. Software component technology supports the cost-effective design of applications suited to...
International audienceTrust in computer science mostly relies on evaluating the risks of using a too...
As the complexity of current software systems increases, we see a correlative increase in the number...
Trust is essential for further and wider acceptance of contemporary e-services. It was first address...