Trust establishment requires evidence about the system’s ability to operate as expected. However, the nature of this evidence and its representation and usage in trust evaluation still remains an open problem. Current mechanisms for collecting this evidence, such as the TCG integrity schema, do not support the linkage of this evidence and therefore limit the kinds of properties that can be verified. We argue that provenance provides more comprehensive evidence that can be represented in a manner that eases trust evaluation. Towards this end, we propose a provenance-based model for reasoning about a system’s ability to satisfy trust properties of interest. This approach enables interoperability, supports multiple abstractions and enables eva...
Binary attestation in trusted computing provides the ability to reason about the state of a platform...
Workflow forms a key part of many existing Service Oriented applications, involving the integration ...
This paper describes the mechanisms involved in accessing provenance on the Web, according to the ne...
Trust is a crucial aspect for open distributed systems. Especially as users may rely on the shared s...
The need for trustworthy system operation has been acknowledged in many circles. However, establishi...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Provenance is the documentation concerning the origin of a result generated by a process, and provid...
The interest in data provenance and trust has been increasing in the last years and the community is...
Given the significant increase of on-line services that require personal information from users, the...
The Web has become an open decentralized global information / knowledge repository, a platform for d...
Trust is a broad concept that in many systems is often reduced to user reputation alone. However, us...
Abstract. Binary attestation in trusted computing provides the ability to reason about the state of ...
Today, with the advances of information technology, individual people and organizations can obtain a...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Provenance is an increasing concern due to the revolution in sharing and processing scientific data ...
Binary attestation in trusted computing provides the ability to reason about the state of a platform...
Workflow forms a key part of many existing Service Oriented applications, involving the integration ...
This paper describes the mechanisms involved in accessing provenance on the Web, according to the ne...
Trust is a crucial aspect for open distributed systems. Especially as users may rely on the shared s...
The need for trustworthy system operation has been acknowledged in many circles. However, establishi...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Provenance is the documentation concerning the origin of a result generated by a process, and provid...
The interest in data provenance and trust has been increasing in the last years and the community is...
Given the significant increase of on-line services that require personal information from users, the...
The Web has become an open decentralized global information / knowledge repository, a platform for d...
Trust is a broad concept that in many systems is often reduced to user reputation alone. However, us...
Abstract. Binary attestation in trusted computing provides the ability to reason about the state of ...
Today, with the advances of information technology, individual people and organizations can obtain a...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Provenance is an increasing concern due to the revolution in sharing and processing scientific data ...
Binary attestation in trusted computing provides the ability to reason about the state of a platform...
Workflow forms a key part of many existing Service Oriented applications, involving the integration ...
This paper describes the mechanisms involved in accessing provenance on the Web, according to the ne...