The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The coming age of ``big data'' has been a recent focus of IT companies, governments, and even the World Economic Forum (WEF). The rapid, exponential growth of global data outpaces Moore's law improvements in computing and storage efficiency, creating a growing ``energy wall'' in coping with global data. We observe in this paper that this problem is significantly exacerbated by (needed) security mechanisms...
Kernel-level attacks can compromise the security of an operating system by tampering with key data and control flow in the kernel. Current approaches defend against these attacks by applying data integrity or control flow integrity control methods. However, they focus on only a certain aspect and cannot give a complete integrity monitoring solution. This paper tries our best to find out all resorts...
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. Crafting the core of such a system in a way that achieves flexibility, security, and performance requires a careful balancing act. Simple static primitives with hard partitions of space and time are easier to analyze formally,...
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the control of media for entertainment, or supporting a remote monitoring interface) while others are absolutely critical (such as the control of safety mechanisms, or maintaining the secrecy of a root key). While special purpose languages,...
RFID (radio frequency identification) is the key technology to open the new era of computing history, i.e., machine perception or sensor age. However, one major stumbling block of using RFID technology in ubiquitous environment is the lack of security enforcement. In this paper, we introduce a systematic approach to enhance RFID middleware with the access control, user authentication, and session...
RBAC models have generated great interest in the security community as a powerful and generalized approach to security management. However traditional RBAC cannot easily support context based access control. In this paper, we propose an extended RBAC model based on context information. The core RBAC model is extended with a general expression of context information. Context rules that have ability...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.