NBN:IT The Italian trusted persistent identifier infrastructure

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

KPI: A Security Infrastructure for Trusted Devices

Deployments of perhaps billions of autonomous, heterogeneous wireless devices, some fixed and some mobile, manufactured by different vendors, with varying capabilities, and very different purposes, but with one common feature that every device will have the ability to communicate with any other device are expected to organize themselves into pervasive, highly interconnected, ad hoc networks. Su...

متن کامل

Characterizing persistent excitation for the sign-sign equation error identifier

AImtrad--The sign-sign (SS) algorithm is a computationaUy efficient adaptive identifier, often used in signal processing tasks. It is obtained by introducing signum functions on both the regressor and the prediction error multiplicands in the update kernel of the well-known LMS algorithm. This paper gives a deterministic persistent excitation condition on the regressor sequence which guarantees...

متن کامل

Security for the cloud infrastructure: Trusted virtual data center implementation

infrastructure: Trusted virtual data center implementation S. Berger R. Cáceres K. Goldman D. Pendarakis R. Perez J. R. Rao E. Rom R. Sailer W. Schildhauer D. Srinivasan S. Tal E. Valdez The trusted virtual data center (TVDc) is a technology developed to address the need for strong isolation and integrity guarantees in virtualized environments. In this paper, we extend previous work on the TVDc...

متن کامل

Trusted Declassification: Policy Infrastructure for a Security-Typed Language

Security-typed languages are a powerful tools for developing verifiably secure software applications. Programs written in these languages enforce a strong, global policy of noninterference which ensures that high-security data will not be observable on low-security channels. Because noninterference is typically too strong a property, most programs use some form of declassification to selectivel...

متن کامل

DHT-based security infrastructure for trusted internet and grid computing

We designed a distributed security infrastructure with self-defence capabilities to secure networked resources in Grids and internet applications. This paper reports new developments in fuzzy trust management, game-theoretic Grid models, security-binding methodology, as well as new Grid performance metrics, defence architecture and mechanisms against intrusions, worms, and low-rate pulsing Dist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Knowledge and Learning

سال: 2014

ISSN: 1741-1009,1741-1017

DOI: 10.1504/ijkl.2014.069536