The proceedings contain 56 papers. The topics discussed include: intelligent FH sequence for high security satellite communication: the generation, performance analysis and application;from IoT to ephemeral computing:...
ISBN:
(纸本)9781450348447
The proceedings contain 56 papers. The topics discussed include: intelligent FH sequence for high security satellite communication: the generation, performance analysis and application;from IoT to ephemeral computing: understanding cyber-physical interactions;towards sustainable smart society: big data driven approaches;towards sustainable smart society: big data driven approaches;cooperative hybrid wireless-powerline channel transmission for peer-to-peer energy trading and sharing system;a survey on authentication techniques for the Internet of things;an improved dynamic load balancing algorithm applied to a cafeteria system in a university campus;and a survey on data confidentiality and privacy in cloud computing.
The growing adoption of distributed data processing frameworks in a wide diversity of application domains challenges end-to-end integration of properties like security, in particular when considering deployments in th...
详细信息
The exponential growth of data produced, the ever faster and ubiquitous connectivity, and the collaborative processing tools lead to a clear shift of data stores from local servers to the cloud. This migration occurri...
详细信息
ISBN:
(纸本)9781450350358
The exponential growth of data produced, the ever faster and ubiquitous connectivity, and the collaborative processing tools lead to a clear shift of data stores from local servers to the cloud. This migration occurring across different application domains and types of users-individual or corporate-raises two immediate challenges. First, out-sourcing data introduces security risks, hence protection mechanisms must be put in place to provide guarantees such as privacy, confidentiality and integrity. Second, there is no "one-size-fits-all" solution that would provide the right level of safety or performance for all applications and users, and it is therefore necessary to provide mechanisms that can be tailored to the various deployment scenarios. In this paper, we address both challenges by introducing SafeFS, a modular architecture based on software-defined storage principles featuring stackable building blocks that can be combined to construct a secure distributed file system. SafeFS allows users to specialize their data store to their specific needs by choosing the combination of blocks that provide the best safety and performance tradeoffs. The file system is implemented in user space using FUSE and can access remote data stores. The provided building blocks notably include mechanisms based on encryption, replication, and coding. We implemented SafeFS and performed in-depth evaluation across a range of workloads. Results reveal that while each layer has a cost, one can build safe yet efficient storage architectures. Furthermore, the different combinations of blocks sometimes yield surprising tradeoffs.
The proceedings contain 41 papers. The topics discussed include: on the suitability of dissemination-centric access control systems for group-centric sharing;Streamforce: outsourcing access control enforcement for str...
ISBN:
(纸本)9781450322782
The proceedings contain 41 papers. The topics discussed include: on the suitability of dissemination-centric access control systems for group-centric sharing;Streamforce: outsourcing access control enforcement for stream data to the clouds;automated black-box detection of access control vulnerabilities in web applications;PhishSafe: leveraging modern Javascript API's for transparent and robust protection;COMPARS: toward an empirical approach for comparing the resilience of reputation systems;situational awareness through reasoning on network incidents;measuring the robustness of source program obfuscation: studying the impact of compiler optimizations on the obfuscation of C programs;interaction provenance model for unified authentication factors in service oriented computing;POSTER: a pairing-free certificateless hybrid signcryption scheme for advanced metering infrastructures;and DIVILAR: diversifying intermediate language for anti-repackaging on Android platform.
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, as they are sensitive by nature, and, t...
详细信息
ISBN:
(纸本)9781450339353
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, as they are sensitive by nature, and, thus, usually employ their own authorization solutions to regulate access to them. In this paper, we highlight that harmonizing authorization solutions at the coalition level raises many challenges. We demonstrate how we address authorization challenges in the context of a scenario defined by military experts using a prototype implementation of SAFAX, an XacmL-based architectural framework tailored to the development of authorization services for distributed systems.
System primitives allow formalisms, reasoning, simulations, and reliability and security risk-tradeoffs to be formulated and argued. In this work, six core primitives belonging to most distributed systems are presente...
详细信息
ISBN:
(纸本)9781450339353
System primitives allow formalisms, reasoning, simulations, and reliability and security risk-tradeoffs to be formulated and argued. In this work, six core primitives belonging to most distributed systems are presented. These primitives apply well to systems with large amounts of data, scalability concerns, heterogeneity concerns, temporal concerns, and elements of unknown pedigree with possible nefarious intent. These primitives form the basic building blocks for a Network of 'Things' (NoT), including the Internet of Things (IoT). This keynote offers an underlying and foundational science to IoT. To my knowledge, the ideas and the manner in which the science underlying IoT is presented here is unique. Further, this talk reflects my personal viewpoints and not those of NIST.
暂无评论