Authenticating public terminals
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on computer network security
WebCard: a java card web server
Proceedings of the fourth working conference on smart card research and advanced applications on Smart card research and advanced applications
Understanding PKI: Concepts, Standards, and Deployment Considerations
Understanding PKI: Concepts, Standards, and Deployment Considerations
Smart Card Handbook
Virtual Organizations: Systems and Practices
Virtual Organizations: Systems and Practices
Securing a Remote Terminal Application with a Mobile Trusted Device
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Reincarnating PCs with portable SoulPads
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Service-Oriented Architecture: Concepts, Technology, and Design
Service-Oriented Architecture: Concepts, Technology, and Design
Virtual Machines: Versatile Platforms for Systems and Processes (The Morgan Kaufmann Series in Computer Architecture and Design)
Network smart card review and analysis
Computer Networks: The International Journal of Computer and Telecommunications Networking
Improving authentication of remote card transactions with mobile personal trusted devices
Computer Communications
Administering access control in dynamic coalitions
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets
WETICE '06 Proceedings of the 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
IEEE Security and Privacy
Towards Trustworthy Kiosk Computing
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
User-Controlled Collaborations in the Context of Trust Extended Environments
WETICE '07 Proceedings of the 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
Smart Cards, Tokens, Security and Applications
Smart Cards, Tokens, Security and Applications
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
An Ontology for Virtual Organization Breeding Environments
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Internet card, a smart card as a true Internet node
Computer Communications
A survey of trust in social networks
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
In recent years, a clear trend has emerged where businesses need to provide flexible access to its services so as to increase their usage by a much wider cross-section of users operating over public infrastructures but still within a trusted environment. This trusted environment must be established between all participating users and service provider entities before any transactions are carried out. To meet the challenge of enabling mobile users to work within a trusted environment on any untrusted machine, the notion of a trusted personal device (TPD) has emerged. This paper provides a survey giving a snapshot of the growing body of work ongoing in the area of TPDs and the services they support.