SDTE: A secure blockchain-based data trading ecosystem

W Dai, C Dai, KKR Choo, C Cui… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Data, a key asset in our data-driven economy, has fueled the emergence of a new data
trading industry. However, there are a number of limitations in conventional data trading …

Enabling refinable {Cross-Host} attack investigation with efficient data flow tagging and tracking

Y Ji, S Lee, M Fazzini, J Allen, E Downing… - 27th USENIX Security …, 2018 - usenix.org
Investigating attacks across multiple hosts is challenging. The true dependencies between
security-sensitive files, network endpoints, or memory objects from different hosts can be …

{FlowDist}:{Multi-Staged}{Refinement-Based} Dynamic Information Flow Analysis for Distributed Software Systems

X Fu, H Cai - 30th USENIX security symposium (USENIX Security 21 …, 2021 - usenix.org
Dynamic information flow analysis (DIFA) supports various security applications such as
malware analysis and vulnerability discovery. Yet traditional DIFA approaches have limited …

Straighttaint: Decoupled offline symbolic taint analysis

J Ming, D Wu, J Wang, G **ao, P Liu - Proceedings of the 31st IEEE/ACM …, 2016 - dl.acm.org
Taint analysis has been widely applied in ex post facto security applications, such as attack
provenance investigation, computer forensic analysis, and reverse engineering …

Cloud Security Using Fine-Grained Efficient Information Flow Tracking

F Alqahtani, M Almutairi, FT Sheldon - Future Internet, 2024 - mdpi.com
This study provides a comprehensive review and comparative analysis of existing
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …

Usage control specification, enforcement, and robustness: A survey

I Akaichi, S Kirrane - arxiv preprint arxiv:2203.04800, 2022 - arxiv.org
The management of data and digital assets poses various challenges, including the need to
adhere to legal requirements with respect to personal data protection and copyright. Usage …

Offering security diagnosis as a service for cloud SaaS applications

M Elsayed, M Zulkernine - Journal of information security and applications, 2019 - Elsevier
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …

Epics: A framework for enforcing security policies in composite web services

R Ranchal, B Bhargava, P Angin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With advances in cloud computing and the emergence of service marketplaces, the
popularity of composite services marks a paradigm shift from single-domain monolithic …

Cloudsafetynet: Detecting data leakage between cloud tenants

C Priebe, D Muthukumaran, D O'Keeffe… - … of the 6th edition of the …, 2014 - dl.acm.org
When tenants deploy applications under the control of third-party cloud providers, they must
trust the provider's security mechanisms for inter-tenant isolation, resource sharing and …

Location-enhanced authentication using the IoT: Because you cannot be in two places at once

I Agadakos, P Hallgren, D Damopoulos… - Proceedings of the …, 2016 - dl.acm.org
User location can act as an additional factor of authentication in scenarios where physical
presence is required, such as when making in-person purchases or unlocking a vehicle …