NBN:IT The Italian trusted persistent identifier infrastructure
نویسندگان
چکیده
منابع مشابه
KPI: A Security Infrastructure for Trusted Devices
Deployments of perhaps billions of autonomous, heterogeneous wireless devices, some fixed and some mobile, manufactured by different vendors, with varying capabilities, and very different purposes, but with one common feature that every device will have the ability to communicate with any other device are expected to organize themselves into pervasive, highly interconnected, ad hoc networks. Su...
متن کاملCharacterizing persistent excitation for the sign-sign equation error identifier
AImtrad--The sign-sign (SS) algorithm is a computationaUy efficient adaptive identifier, often used in signal processing tasks. It is obtained by introducing signum functions on both the regressor and the prediction error multiplicands in the update kernel of the well-known LMS algorithm. This paper gives a deterministic persistent excitation condition on the regressor sequence which guarantees...
متن کاملSecurity for the cloud infrastructure: Trusted virtual data center implementation
infrastructure: Trusted virtual data center implementation S. Berger R. Cáceres K. Goldman D. Pendarakis R. Perez J. R. Rao E. Rom R. Sailer W. Schildhauer D. Srinivasan S. Tal E. Valdez The trusted virtual data center (TVDc) is a technology developed to address the need for strong isolation and integrity guarantees in virtualized environments. In this paper, we extend previous work on the TVDc...
متن کاملTrusted Declassification: Policy Infrastructure for a Security-Typed Language
Security-typed languages are a powerful tools for developing verifiably secure software applications. Programs written in these languages enforce a strong, global policy of noninterference which ensures that high-security data will not be observable on low-security channels. Because noninterference is typically too strong a property, most programs use some form of declassification to selectivel...
متن کاملDHT-based security infrastructure for trusted internet and grid computing
We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Dist...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Knowledge and Learning
سال: 2014
ISSN: 1741-1009,1741-1017
DOI: 10.1504/ijkl.2014.069536