On cloud security requirements, threats, vulnerabilities and countermeasures: A survey
R Kumar, R Goyal - Computer Science Review, 2019 - Elsevier
The world is witnessing a phenomenal growth in the cloud enabled services and is expected
to grow further with the improved technological innovations. However, the associated …
to grow further with the improved technological innovations. However, the associated …
A systematic mapping study of security concepts for configurable data storages
Most modern software systems can be configured to fulfill specific customer requirements,
adapting their behavior as required. However, such adaptations also increase the need to …
adapting their behavior as required. However, such adaptations also increase the need to …
[HTML][HTML] A self-adaptation-based approach to resilience improvement of complex internets of utility systems
Resilience improvement of complex internets of utility systems is still an open issue for the
current research. Proposed solutions fail to implement an integrated approach to detection …
current research. Proposed solutions fail to implement an integrated approach to detection …
Privacy-preserving credit scoring via functional encryption
The majority of financial organizations managing confidential data are aware of security
threats and leverage widely accepted solutions (eg, storage encryption, transport-level …
threats and leverage widely accepted solutions (eg, storage encryption, transport-level …
An abstract reasoning architecture for privacy policies monitoring
Privacy is a topic of increasing interest not only for scientific communities, but also for public
opinion and for regulatory bodies from all Countries. The problem is that privacy …
opinion and for regulatory bodies from all Countries. The problem is that privacy …
[PDF][PDF] Facing the Blockchain Endpoint Vulnerability, an SGX-based Solution for Secure eHealth Auditing.
Abstract According to McAfee Labs, even in 2019, the eHealth sector is confirmed as one of
the most critical in terms of cybersecurity incidents. It is estimated that more than 176 million …
the most critical in terms of cybersecurity incidents. It is estimated that more than 176 million …
Securing smart metering applications in untrusted clouds with the securecloud platform
RJ Riella, LM Iantorno, LCR Junior, D Seidel… - Proceedings of the 1st …, 2018 - dl.acm.org
Data security in smart metering applications is important not only to secure the customer
privacy but also to protect the power utility against fraud attempts. Usual deployment of …
privacy but also to protect the power utility against fraud attempts. Usual deployment of …
An approach for securing cloud-based wide area monitoring of smart grid systems
Computing power and flexibility provided by cloud technologies represent an opportunity for
Smart Grid applications, in general, and for Wide Area Monitoring Systems, in particular …
Smart Grid applications, in general, and for Wide Area Monitoring Systems, in particular …
Securing the weak link of federated systems via trusted execution: A case study from the eHealth domain
The interconnection of organisations from distributed, heterogeneous, and autonomous
domains having different regulations often requires a trusted third-party gateway to translate …
domains having different regulations often requires a trusted third-party gateway to translate …
Confidential remote computing
KA Küçük - 2022 - ora.ox.ac.uk
Since their market launch in late 2015, trusted hardware enclaves have revolutionised the
computing world with data-in-use protections. Their security features of confidentiality …
computing world with data-in-use protections. Their security features of confidentiality …