Trust management of services in cloud environments: Obstacles and solutions

TH Noor, QZ Sheng, S Zeadally, J Yu - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
Trust management is one of the most challenging issues in the emerging cloud computing
area. Over the past few years, many studies have proposed different techniques to address …

A tutorial on physical security and side-channel attacks

F Koeune, FX Standaert - International School on Foundations of Security …, 2004 - Springer
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …

Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation

B Yuan, Y Jia, L **ng, D Zhao, XF Wang… - 29th USENIX security …, 2020 - usenix.org
IoT clouds facilitate the communication between IoT devices and users, and authorize users'
access to their devices. In this paradigm, an IoT device is usually managed under a …

[LIBRO][B] Security for web services and service-oriented architectures

E Bertino, L Martino, F Paci, A Squicciarini - 2010 - Springer
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …

{WAVE}: A decentralized authorization framework with transitive delegation

MP Andersen, S Kumar, M AbdelBaky… - 28th USENIX Security …, 2019 - usenix.org
Most deployed authorization systems rely on a central trusted service whose compromise
can lead to the breach of millions of user accounts and permissions. We present WAVE, an …

Privacy aware access control for big data: A research roadmap

P Colombo, E Ferrari - Big Data Research, 2015 - Elsevier
Big Data is an emerging phenomenon that is rapidly changing business models and work
styles [1]. Big Data platforms allow the storage and analysis of high volumes of data with …

Secure knowledge management: confidentiality, trust, and privacy

E Bertino, LR Khan, R Sandhu… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Knowledge management enhances the value of a corporation by identifying the assets and
expertise as well as efficiently managing the resources. Security for knowledge …

P-verifier: Understanding and mitigating security risks in cloud-based iot access policies

Z **, L **ng, Y Fang, Y Jia, B Yuan, Q Liu - Proceedings of the 2022 …, 2022 - dl.acm.org
Modern IoT device manufacturers are taking advantage of the managed Platform-as-a-
Service (PaaS) and Infrastructure-as-a-Service (IaaS) IoT clouds (eg, AWS IoT, Azure IoT) …

Locally rigid globally non-rigid surface registration

K Fujiwara, K Nishino, J Takamatsu… - … on Computer Vision, 2011 - ieeexplore.ieee.org
We present a novel non-rigid surface registration method that achieves high accuracy and
matches characteristic features without manual intervention. The key insight is to consider …

Achieving privacy in trust negotiations with an ontology-based approach

AC Squicciarini, E Bertino, E Ferrari… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
The increasing use of Internet in a variety of distributed multiparty interactions and
transactions with strong real-time requirements has pushed the search for solutions to the …