This paper presents the implementation and performance evaluation of a real, secure object-based storage system compliant to the TIO OSD standard. In contrast to previous work, ou...
Zhongying Niu, Ke Zhou, Dan Feng, Hong Jiang, Fran...
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
1 2 There is a critical need in computer security to communicate risks and thereby enable informed decisions by naive users. Yet computer security has not been engaged with the sc...
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...