Now showing items 1-6 of 6
The Design and Applications of a Privacy-Preserving Identity and Trust-Management System
Identities are present in the interactions between individuals and organizations. Online shopping requires credit card information, while e-government services require social security or passport numbers. The involvement ...
Embedding Security Monitors in Software Components
Software can be made more secure by stipulating and integrating security specifications in the development process. However, guaranteeing the correct implementation of these specifications is a daunting task. In spite of ...
On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment
As Cloud services become more commonplace, recent works have uncovered vulnerabilities unique to such systems. Specifi cally, the paradigm promotes a risk of information leakage across virtual machine isolation via ...
With the rapid proliferation of the internet, web browsers have evolved from single-purpose remote document viewers into multifaceted systems for executing dynamic, interactive web applications. In order to enhance the web ...
IDSAAS: INTRUSION DETECTION SYSTEM AS A SERVICE IN PUBLIC CLOUDS
In a public cloud computing environment, consumers cannot always just depend on the cloud provider’s security infrastructure. They may need to monitor and protect their virtual existence by implementing their own intrusion ...