公式タイトルと情報はIP Exchange PlusとPremiumのユーザーのみが利用可能です。
特許 係属中 In information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication mechanisms, such as Public Key Infrastructures (PKIs)[1] or Kerberos[2] have allowed this model to be extended to distributed systems within a few closely collaborating domains or within a single administrative domain.