Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 16, Issue 2March 2019
Publisher:
  • IEEE Computer Society Press
  • Washington
  • DC
  • United States
ISSN:1545-5971
Reflects downloads up to 01 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Defending Against Web Application Attacks: Approaches, Challenges and Implications

Some of the most dangerous web attacks, such as Cross-Site Scripting and sql injection, exploit vulnerabilities in web applications that may accept and process data of uncertain origin without proper validation or filtering, allowing the injection and ...

research-article
Design and Implementation of the Ascend Secure Processor

This paper presents post-silicon results for the Ascend secure processor, taped out in a 32 nm SOI process. Ascend prevents information leakage over a processor's digital I/O pinsin particular, the processor's requests to external memoryand certifies ...

research-article
Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models Based on Pre-Computation

Many data-driven personalized services require that private data of users is scored against a trained machine learning model. In this paper we propose a novel protocol for privacy-preserving classification of decision trees, a popular machine learning ...

research-article
Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

Attack graphs are a powerful tool for security risk assessment by analysing network vulnerabilities and the paths attackers can use to compromise network resources. The uncertainty about the attacker's behaviour makes Bayesian networks suitable to model ...

research-article
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data

Spatial data have wide applications, e.g., location-based services, and geometric range queries (i.e., finding points inside geometric areas, e.g., circles or polygons) are one of the fundamental search functions over spatial data. The rising demand of ...

research-article
Fault-Tolerant Adaptive Routing in Dragonfly Networks

Dragonfly networks have been widely used in the current high-performance computers or high-end servers. Fault-tolerant routing in dragonfly networks is essential. The rich interconnects provide good fault-tolerance ability for the network. A new ...

research-article
Investigating the Multi-Ciphersuite and Backwards-Compatibility Security of the Upcoming TLS 1.3

Transport Layer Security (TLS) is one of the most widely used Internet protocols for secure communications. TLS 1.3, the next-generation protocol, is currently under development, with the latest candidate being draft-18. For flexibility and ...

research-article
KI-Mon ARM: A Hardware-Assisted Event-triggered Monitoring Platform for Mutable Kernel Object

External hardware-based kernel integrity monitors have been proposed to mitigate kernel-level malwares. However, the existing external approaches have been limited to monitoring the static regions of kernel while the latest rootkits manipulate the ...

research-article
Optimal Spot-Checking for Collusion Tolerance in Computer Grids

Many grid-computing systems adopt voting-based techniques to resist sabotage. However, these techniques become ineffective in grid systems subject to collusion behavior, where some malicious resources can collectively sabotage a job execution by ...

research-article
Privacy-Aware Caching in Information-Centric Networking

Information-Centric Networking (ICN) is an emerging networking paradigm where named and routable data (content) is the focal point. Users send explicit requests (interests) which specify content by name, and the network handles routing these interests ...

research-article
Privacy-Preserving Aggregate Queries for Optimal Location Selection

Today, vast amounts of location data are collected by various service providers. These location data owners have a good idea of where their users are most of the time. Other businesses also want to use this information for location analytics, such as ...

research-article
Privacy-Preserving Multi-Keyword Top-$k$: Similarity Search Over Encrypted Data

Cloud computing provides individuals and enterprises massive computing power and scalable storage capacities to support a variety of big data applications in domains like health care and scientific research, therefore more and more data owners are ...

research-article
Security Pricing as Enabler of Cyber-Insurance A First Look at Differentiated Pricing Markets

Despite the promising potential of network risk management services (e.g., cyber-insurance) to improve information security, their deployment is relatively scarce, primarily due to such service companies being unable to guarantee profitability. As a ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.