the Internet of things (IoT) stands as a revolutionary technology which impacts smart agriculture and different sectors beyond it. the research describes an intelligent IoT-enabled monitoring system which uses sensors...
详细信息
the process of recognizing a person from photos or videos taken with a different camera is called re-identification (reID). In today's world, the widespread use of extensive networks of CCTV and security cameras m...
详细信息
Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting su...
详细信息
ISBN:
(纸本)9798400700507
Clouds and massive-scale computing infrastructures are starting to dominate computing and will likely continue to do so for the foreseeable future. Major cloud operators are now comprising millions of cores hosting substantial fractions of corporate and government IT infrastructure. CCSW is the world's premier forum bringing together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including: Side channel attacks Cryptographic protocols for cloud security Secure cloud resource virtualization mechanisms Secure data management outsourcing (e.g., database as a service) Privacy and integrity mechanisms for outsourcing Foundations of cloud-centric threat models Secure computation outsourcing Remote attestation mechanisms in clouds Sandboxing and VM-based enforcements Trust and policy management in clouds Secure identity management mechanisms Cloud-aware web service security paradigms and mechanisms Cloud-centric regulatory compliance issues and mechanisms Business and security risk models and clouds Cost and usability models and their interaction withsecurity in clouds Scalability of security in global-size clouds Binary analysis of software for remote attestation and cloud protection Network security (DOS, IDS etc.) mechanisms for cloud contexts security for emerging cloud programming models Energy/cost/efficiency of security in clouds mOpen hardware for cloud Machine learning for cloud protection CCSW especially encourages novel paradigms and controversial ideas that are not on the above list. the workshop has historically acted as a fertile ground for creative debate and interaction in security-sensitive areas of computing impacted by clouds. this year marked the 14th anniversary of CCSW. In the past decade, CCSW has had a significant impact in our research community.
Traditional security measures focused on network perimeter protection are no longer sufficient to defend against cyber threats in the quickly changing digital environment of today. A zero-trust architecture (ZTA), whi...
详细信息
Due to the significant asymmetry between the high frequency of access and the low protection level of government networks and their edge devices, there is a considerable risk of being targeted by hackers. this study i...
详细信息
the proceedings contain 115 papers. the topics discussed include: receding horizon and optimization-based control for UAV path planning with collision avoidance;application of machine learning in technological forecas...
the proceedings contain 115 papers. the topics discussed include: receding horizon and optimization-based control for UAV path planning with collision avoidance;application of machine learning in technological forecasting;unbiased text categorization in IoT-based digital content using a word-to-graph model;multimodal sentiment analysis based on video and audio inputs;asynchronous inter-class project collaboration adaptation method to agile practices in university context;resource consumption analysis of distributed machine learning for the security of future networks;modeling Wazuh rules with weighted timed automata;evaluating safe region sizes for accuracy in approximate continuous nearest neighbor queries;and intrusion detection systems in IoT based on machine learning: a state of the art.
Cloud Computing has reformed the way agencies manage and store their data by offering scalable and flexible computing resources. However, data security and trustworthiness in the cloud remain major concerns. Trust-bas...
详细信息
To address the storage capacity limitations and high costs inherent in the existing single-chain storage model of blockchain-based traceability systems, a strategy combining on-chain and off-chain storage using IPFS a...
详细信息
Internet of things (IoT) applications, such as e-healthcare departments have grown tremendously where devices gather patient data and instantly transmit it over a distance to servers. Despite its huge advantages, IoT ...
详细信息
Smart environments are worried about private keys and security problems. To prevent security attacks, which take benefit of a few of these intrusion detection systems (IDSs) and security vulnerabilities, were modeled....
详细信息
暂无评论