To shift this paradigm, we propose a new inference control architecture that will entrust inference control to each users platform, provided that the platform ...
In this paper, we outline a security protocol that uses resource-constrained trusted hardware to facilitate anony-mous IP-address blocking in anonymizing ...
The new architecture entrusts the enforcement of inference control to individual users' computer platforms. In this new architecture, the database server is ...
To shift this paradigm, we propose a new inference control architecture that will entrust inference control to each users platform, provided that the platform ...
To resolve the impracticality problem, we propose a new architecture for inference control (especially auditing) with trusted com- puting. The new architecture ...
People also ask
What is inference control in security in computing?
What is the architecture of trusted computing?
What are inference controls?
Example in Yang et al. (2007) a new paradigm of inference control with trusted computing was developed to push the inference control from server side to client ...
This paper proposes a new inference control architecture, entrusting inference control to each user's platform that is equipped with trusted computing ...
In this paper, we shift this paradigm by proposing a new inference control architecture, entrusting inference control to each user's platform that is ...
The current paradigm for trusted computer syst,ems holds that trust is a property of a system. It is a. property that ca.n be formally modeled, specified, ...
Missing: Inference | Show results with:Inference
Nov 17, 2008 · The trusted computing technology is designed to attest the state of a user's platform to the database server, so as to assure the server that ...