Sciweavers

739 search results - page 65 / 148
» Security Challenges in Cloud Computing
Sort
View
SACMAT
2010
ACM
15 years 2 months ago
Enforcing spatial constraints for mobile RBAC systems
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the administrative and security advantages of RBAC with the dynamic nature of mobile and...
Michael S. Kirkpatrick, Elisa Bertino
ACSAC
2009
IEEE
15 years 8 months ago
BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems
Audit logs, providing information about the current and past states of systems, are one of the most important parts of modern computer systems. Providing security for audit logs on...
Attila Altay Yavuz, Peng Ning
150
Voted
APLAS
2011
ACM
14 years 4 months ago
Decentralized Delimited Release
Abstract. Decentralization is a major challenge for secure computing. In a decentralized setting, principals are free to distrust each other. The key challenge is to provide suppor...
Jonas Magazinius, Aslan Askarov, Andrei Sabelfeld
EUROCRYPT
2009
Springer
16 years 4 months ago
Smashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol...
Khaled Ouafi, Serge Vaudenay
HUC
2009
Springer
15 years 8 months ago
A spotlight on security and privacy risks with future household robots: attacks and lessons
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
Tamara Denning, Cynthia Matuszek, Karl Koscher, Jo...