Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authorit...
详细信息
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authority ciphertext-policy ABE (MA-CP-ABE) scheme on prime order groups was proposed when a dual pairing vector space approach was employed. The proposed scheme supports any monotone access structure, and is proven adaptively secure from the decisional linear assumption in the standard model. Performance analysis indicates that our scheme is more efficient while achieving the adaptive security.
Quick defense against the spread of software exploits is an important problem, and hot patching is an attractive approach to solve this problem. However, these approaches cannot adapt to cloud well, which brings new c...
详细信息
ISBN:
(纸本)9781479965144
Quick defense against the spread of software exploits is an important problem, and hot patching is an attractive approach to solve this problem. However, these approaches cannot adapt to cloud well, which brings new challenges to the protection of software. Among these challenges, transparency and rapid deployment are two respective requirements for protection. In this paper, we propose vPatcher, a transparent data patching technique based on Virtual Machine Introspection. Vpatcher uses hypervisor to monitor the network connections of vulnerable programs in protected guest systems, deployed outside the Virtual Machines, without disturbing the target guest systems. Given the vulnerability signatures, vPatcher intercepts network packets, scans these packets for vulnerable processes by reconstructing fine-grained system semantics that include process states as well as corresponding network connections, detects them with their vulnerability signatures, and finally filters exploits. We adopted several realistic vulnerable programs used broadly to evaluate the effectiveness of the technique, and experimental results showed its efficacy and that the overhead is acceptable. In addition, the experiments also show that it could be transparent to guest systems, and suitable for rapid deployment in cloud platforms.
Delay Tolerant Networks (DTN) is one of the mobile wireless networks that topology logic may change frequently. Variable topology logic characteristics lead to several low efficiency routing problems, and in which how...
详细信息
Online social networks are rapidly becoming popular for users to share, organize and locate interesting content. Users pay much attention to their close friends, those direct or two-hop friends. Users of Facebook comm...
详细信息
As an import trend of cyberspace in the future, cloud computing has attracted much attention from the IT industry. Many research institutions and companies have launched their own cloud platforms, which have virtual m...
详细信息
Cloud computing contains many enterprise applications that require from each user to perform authenticate at first step. Then, he will gain a permit from the service provider to access resources at second step. The is...
详细信息
Recently the flexibility of RDF data model makes increasing number of organizations and communities keep their data available in the RDF format. There is a growing need for querying these data in scalable and efficien...
详细信息
Web service technologies have been widely used in diverse applications. However, there are still many security challenges in reliability, confidentiality and data nonrepudiation, which are prominent especially in some...
详细信息
In recent years, cloud computing is establishing itself as the latest high-performance and high-throughput computing paradigm, and thus doing business in the cloud is becoming a reality. However, due to the dynamic na...
详细信息
ISBN:
(纸本)9781479967162
In recent years, cloud computing is establishing itself as the latest high-performance and high-throughput computing paradigm, and thus doing business in the cloud is becoming a reality. However, due to the dynamic nature of the cloud environment, the on-time completion of time-constrained business workflows is a big challenge. Workflow temporal verification as the major approach to monitor and control the correctness of temporal consistency plays a critical role in the on-time completion of business workflow instances. In the recent decade, great efforts have been dedicated to the area of workflow temporal verification and it is high time that we should define the key research issues for business cloud workflows in order to keep our research on the right track. In this paper, we systematically investigate this problem and propose four key research issues based on the introduction of a generic temporal verification framework. Meanwhile, some preliminary solutions and open challenges are presented and discussed. Finally, Swin DeW-V, an on-going research project on temporal verification as part of our Swin DeW-C cloud workflow system, is also demonstrated.
Although statistical graph comprehension has been investigated in cognitive psychology, it has not been reported in cognitive neuroscience. The study designed an experimental condition, i.e., a statistical graph (SG),...
详细信息
暂无评论