Privacy-preserving reputation systems based on blockchain and other cryptographic building blocks: A survey
O Hasan, L Brunie, E Bertino - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
The purpose of a reputation system is to hold the users of a distributed application
accountable for their behavior. The reputation of a user is computed as an aggregate of the …
accountable for their behavior. The reputation of a user is computed as an aggregate of the …
Carpooling in connected and autonomous vehicles: current solutions and future directions
Owing to the advancements in communication and computation technologies, the dream of
commercialized connected and autonomous cars is becoming a reality. However, among …
commercialized connected and autonomous cars is becoming a reality. However, among …
TrustCloud: A framework for accountability and trust in cloud computing
The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by
potential customers. While preventive controls for security and privacy are actively …
potential customers. While preventive controls for security and privacy are actively …
Ironclad apps:{End-to-End} security via automated {Full-System} verification
An Ironclad App lets a user securely transmit her data to a remote machine with the
guarantee that every instruction executed on that machine adheres to a formal abstract …
guarantee that every instruction executed on that machine adheres to a formal abstract …
Predicting secret keys via branch prediction
This paper announces a new software side-channel attack—enabled by the branch
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …
prediction capability common to all modern high-performance CPUs. The penalty paid (extra …
Seeing-is-believing: Using camera phones for human-verifiable authentication
Current mechanisms for authenticating communication between devices that share no prior
context are inconvenient for ordinary users, without the assistance of a trusted authority. We …
context are inconvenient for ordinary users, without the assistance of a trusted authority. We …
Principles of remote attestation
G Coker, J Guttman, P Loscocco, A Herzog… - International Journal of …, 2011 - Springer
Remote attestation is the activity of making a claim about properties of a target by supplying
evidence to an appraiser over a network. We identify five central principles to guide …
evidence to an appraiser over a network. We identify five central principles to guide …
On the power of simple branch prediction analysis
Very recently, a new software side-channel attack, called Branch Prediction Analysis (BPA)
attack, has been discovered and also demonstrated to be practically feasible on popular …
attack, has been discovered and also demonstrated to be practically feasible on popular …
Privacy management of personal data
MC Mont, KA Harrison, M Sadler… - US Patent 7,398,393, 2008 - Google Patents
As used herein, the term “personal data'is intended to include data such as identity data and
profile data (for example, preference data and financial data) of a party to which the data …
profile data (for example, preference data and financial data) of a party to which the data …
A privacy manager for cloud computing
We describe a privacy manager for cloud computing, which reduces the risk to the cloud
computing user of their private data being stolen or misused, and also assists the cloud …
computing user of their private data being stolen or misused, and also assists the cloud …