Search results for " Attestation"

showing 6 items of 6 documents

Paul Ricoeur's Surprising Take on Recognition

2011

This essay examines Paul Ricœur’s views on recognition in his book The Course of Recognition. It highlights those aspects that are in some sense surprising, in relation to his previous publications and the general debates on Hegelian Anerkennung and the politics of recognition. After an overview of Ricœur’s book, the paper examines the meaning of “recognition” in Ricœur’s own proposal, in the dictionaries Ricœur uses, and in the contemporary debates. Then it takes a closer look at the ideas of recognition as identification and as “taking as true.” Then it turns to recognition (attestation) of oneself, in light of the distinction between human constants (and the question “What am I?”), and h…

Dialecticlcsh:Philosophy (General)Identity (social science)HegelianismGeneral MedicinePaul Ricœur Recognition Attestation Identity Human ConstantsEpistemologyMeaning (philosophy of language)PoliticsNormativeSociologyIdentification (psychology)lcsh:B1-5802Relation (history of concept)Études Ricoeuriennes / Ricoeur Studies
researchProduct

Trusted dynamic storage for dunbar-based P2P online social networks

2014

Online Social Networks (OSNs) are becoming more and more popular in today's Internet. Distributed Online Social Networks (DOSNs), are OSNs which do not exploit a central server for storing users' data and enable users to have more control on their profile content, ensuring a higher level of privacy. The main challenge of DOSNs comes from guaranteeing availability of the data when the data owner is offline. In this paper we propose a new P2P dynamic approach to the problem of data persistence in DOSNs. By following Dunbar's approach, our system stores the data of a user only on a restricted number of friends which have regular contacts with him/her. Users in this set are chosen by considerin…

P2PSettore INF/01 - InformaticaExploitComputer sciencebusiness.industryControl (management)Trusted Network ConnectSet (abstract data type)Data availabilityHigh availabilityDirect Anonymous AttestationThe InternetDunbarPersistent data structurebusinessDOSNComputer network
researchProduct

Trusted Computing and DRM

2015

Trusted Computing is a special branch of computer security. One branch of computer security involves protection of systems against external attacks. In that branch we include all methods that are used by system owners against external attackers, for example Firewalls, IDS, IPS etc. In all those cases the system owner installs software that uses its own means to determine if a remote user is malicious and terminates the attack. (Such means can be very simple such as detecting signatures of attacks or very complex such as machine learning and detecting anomalies in the usage pattern of the remote user). Another branch of attacks requires protection by the system owner against internal users. …

business.industryComputer scienceCloud computingTrusted ComputingAttack surfaceConditional accessComputer securitycomputer.software_genreDigital mediaDisk encryptionDirect Anonymous AttestationTrusted Platform Modulebusinesscomputer
researchProduct

System for Executing Encrypted Java Programs

2017

pääsynvalvontavirtualisointiJavaComputer sciencetrusted computing02 engineering and technologycomputer.software_genreEncryptionReal time Java020204 information systems0202 electrical engineering electronic engineering information engineeringtietoturvahypervisorJava appletcomputer.programming_languageta113Programming languagebusiness.industrystrictfp020207 software engineeringvirtualizationJava concurrencyremote attestationbusinesscomputerJava annotationJavaProceedings of the 3rd International Conference on Information Systems Security and Privacy
researchProduct

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Preventing reverse engineering of native and managed programs

2015

One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to deal with these issues is code obfuscation. However, it is proven to be ineffective. Code encryption is a much more effective means of defying reverse engineering, but it requires managing a cryptographic key available to none but the permissible users. The thesis presents a system for managing cryptographic keys in a protected environment and supporting execution of encrypted code. The system has strong security guarantees. In particular, the cryptographic keys are never stored on the target…

virtualisointitrusted computingtietokoneohjelmatthin hypervisorvirtualizationbuffered executionremote attestationsalausavaimetsalauslähdekoodittakaisinmallinnushypervisorithypervisortietoturvainterpretationJava
researchProduct