SDTE: A secure blockchain-based data trading ecosystem
Data, a key asset in our data-driven economy, has fueled the emergence of a new data
trading industry. However, there are a number of limitations in conventional data trading …
trading industry. However, there are a number of limitations in conventional data trading …
Enabling refinable {Cross-Host} attack investigation with efficient data flow tagging and tracking
Investigating attacks across multiple hosts is challenging. The true dependencies between
security-sensitive files, network endpoints, or memory objects from different hosts can be …
security-sensitive files, network endpoints, or memory objects from different hosts can be …
{FlowDist}:{Multi-Staged}{Refinement-Based} Dynamic Information Flow Analysis for Distributed Software Systems
Dynamic information flow analysis (DIFA) supports various security applications such as
malware analysis and vulnerability discovery. Yet traditional DIFA approaches have limited …
malware analysis and vulnerability discovery. Yet traditional DIFA approaches have limited …
Straighttaint: Decoupled offline symbolic taint analysis
Taint analysis has been widely applied in ex post facto security applications, such as attack
provenance investigation, computer forensic analysis, and reverse engineering …
provenance investigation, computer forensic analysis, and reverse engineering …
Cloud Security Using Fine-Grained Efficient Information Flow Tracking
This study provides a comprehensive review and comparative analysis of existing
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …
Information Flow Tracking (IFT) tools which underscores the imperative for mitigating data …
Usage control specification, enforcement, and robustness: A survey
I Akaichi, S Kirrane - arxiv preprint arxiv:2203.04800, 2022 - arxiv.org
The management of data and digital assets poses various challenges, including the need to
adhere to legal requirements with respect to personal data protection and copyright. Usage …
adhere to legal requirements with respect to personal data protection and copyright. Usage …
Offering security diagnosis as a service for cloud SaaS applications
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …
technologies, web services have become critical components of Software as a Service …
Epics: A framework for enforcing security policies in composite web services
With advances in cloud computing and the emergence of service marketplaces, the
popularity of composite services marks a paradigm shift from single-domain monolithic …
popularity of composite services marks a paradigm shift from single-domain monolithic …
Cloudsafetynet: Detecting data leakage between cloud tenants
When tenants deploy applications under the control of third-party cloud providers, they must
trust the provider's security mechanisms for inter-tenant isolation, resource sharing and …
trust the provider's security mechanisms for inter-tenant isolation, resource sharing and …
Location-enhanced authentication using the IoT: Because you cannot be in two places at once
User location can act as an additional factor of authentication in scenarios where physical
presence is required, such as when making in-person purchases or unlocking a vehicle …
presence is required, such as when making in-person purchases or unlocking a vehicle …