TRUSTED SYSTEMS

Updated 630 days ago
  • ID: 35956967/64
This page links to research, working papers, articles, presentations and other material relating to CAS work on the use of trusted systems for security or social control. In particular, this project stage is focused on the use of identification and the authentication of identity and reputation to mediate trust-based systems... Trusted systems for purposes of this research are systems in which some conditional prediction about the behavior of people or objects within the system has been determined prior to authorizing access to system resources. For example, trusted systems include the use of "security envelopes" in national security and counterterrorism applications, "trusted computing" initiatives in technical systems security, and the use of identity or credit scoring systems in financial and anti-fraud applications; in general, they include any system (i) in which probabilistic threat or risk analysis is used to assess "trust" for decision-making before authorizing access or for..
  • 0
  • 0
Interest Score
2
HIT Score
0.00
Domain
trustedsystems.info

Actual
www.trustedsystems.info

IP
74.208.236.84

Status
OK

Category
Company
0 comments Add a comment