Trust management of services in cloud environments: Obstacles and solutions
Trust management is one of the most challenging issues in the emerging cloud computing
area. Over the past few years, many studies have proposed different techniques to address …
area. Over the past few years, many studies have proposed different techniques to address …
A tutorial on physical security and side-channel attacks
A recent branch of cryptography focuses on the physical constraints that a real-life
cryptographic device must face, and attempts to exploit these constraints (running time …
cryptographic device must face, and attempts to exploit these constraints (running time …
Shattered Chain of Trust: Understanding Security Risks in {Cross-Cloud}{IoT} Access Delegation
IoT clouds facilitate the communication between IoT devices and users, and authorize users'
access to their devices. In this paradigm, an IoT device is usually managed under a …
access to their devices. In this paradigm, an IoT device is usually managed under a …
[LIBRO][B] Security for web services and service-oriented architectures
Web services technologies are advancing fast and being extensively deployed in many di?
erent application environments. Web services based on the eXt-sible Markup Language …
erent application environments. Web services based on the eXt-sible Markup Language …
{WAVE}: A decentralized authorization framework with transitive delegation
Most deployed authorization systems rely on a central trusted service whose compromise
can lead to the breach of millions of user accounts and permissions. We present WAVE, an …
can lead to the breach of millions of user accounts and permissions. We present WAVE, an …
Privacy aware access control for big data: A research roadmap
Big Data is an emerging phenomenon that is rapidly changing business models and work
styles [1]. Big Data platforms allow the storage and analysis of high volumes of data with …
styles [1]. Big Data platforms allow the storage and analysis of high volumes of data with …
Secure knowledge management: confidentiality, trust, and privacy
Knowledge management enhances the value of a corporation by identifying the assets and
expertise as well as efficiently managing the resources. Security for knowledge …
expertise as well as efficiently managing the resources. Security for knowledge …
P-verifier: Understanding and mitigating security risks in cloud-based iot access policies
Modern IoT device manufacturers are taking advantage of the managed Platform-as-a-
Service (PaaS) and Infrastructure-as-a-Service (IaaS) IoT clouds (eg, AWS IoT, Azure IoT) …
Service (PaaS) and Infrastructure-as-a-Service (IaaS) IoT clouds (eg, AWS IoT, Azure IoT) …
Locally rigid globally non-rigid surface registration
We present a novel non-rigid surface registration method that achieves high accuracy and
matches characteristic features without manual intervention. The key insight is to consider …
matches characteristic features without manual intervention. The key insight is to consider …
Achieving privacy in trust negotiations with an ontology-based approach
The increasing use of Internet in a variety of distributed multiparty interactions and
transactions with strong real-time requirements has pushed the search for solutions to the …
transactions with strong real-time requirements has pushed the search for solutions to the …