SBOM. EXE: Countering Dynamic Code Injection based on Software Bill of Materials in Java
Software supply chain attacks have become a significant threat as software development
increasingly relies on contributions from multiple, often unverified sources. The code from …
increasingly relies on contributions from multiple, often unverified sources. The code from …
Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage
Cryptographic cloud storage (CCS) is a secure architecture built in the upper layer of a
public cloud infrastructure. In the CCS system, a user can define and manage the access …
public cloud infrastructure. In the CCS system, a user can define and manage the access …
Astrape: An efficient concurrent cloud attestation with ciphertext-policy attribute-based encryption
Cloud computing emerges as a change in the business paradigm that offers pay-as-you-go
computing capability and brings enormous benefits, but there are numerous organizations …
computing capability and brings enormous benefits, but there are numerous organizations …
Double level Code Scanning Leveraging network virtualization to decrease risks of memory starvation and insecure programming
T Albibrahim, S Hendaoui - 2023 - researchsquare.com
This study investigates the impact of a software-defined networking (SDN) controller on
resource utilization, system stability, and performance in cloud environments, with a specific …
resource utilization, system stability, and performance in cloud environments, with a specific …
[PDF][PDF] Double Level Code Scanning Leveraging Network virtualization and Machine Learning to Mitigate Memory Starvation Risks and Insecure Programming
T Alibrahim, S Hendaoui - 2023 - assets-eu.researchsquare.com
In this study, we investigate the role of software-defined networking (SDN) controller on
memory usage, system stability, and performance in cloud computing networks, with a …
memory usage, system stability, and performance in cloud computing networks, with a …