On security in publish/subscribe services: A survey

C Esposito, M Ciampi - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …

[PDF][PDF] TrInc: Small Trusted Hardware for Large Distributed Systems.

D Levin, JR Douceur, JR Lorch, T Moscibroda - NSDI, 2009 - usenix.org
A simple yet remarkably powerful tool of selfish and malicious participants in a distributed
system is “equivocation”: making conflicting statements to others. We present TrInc, a small …

Method for securing a computing device with a trusted platform module-tpm

RNDEPC CONDE, PJE VERISSIMO - US Patent App. 13/237,886, 2012 - Google Patents
0003. How much is the information inside a computer worth? In general, this question is very
hard to answer. It could be worth anything from a few cents up to several thou sand Euros …

Multi-user dynamic proofs of data possession using trusted hardware

SR Tate, R Vishwanathan, L Everhart - … of the third ACM conference on …, 2013 - dl.acm.org
In storage outsourcing services, clients store their data on a potentially untrusted server,
which has more computational power and storage capacity than the individual clients. In this …

Mercury:{Bandwidth-Effective} Prevention of Rollback Attacks Against Community Repositories

TK Kuppusamy, V Diaz, J Cappos - 2017 USENIX Annual Technical …, 2017 - usenix.org
A popular community repository such as Docker Hub, PyPI, or RubyGems distributes tens of
thousands of software projects to millions of users. The large number of projects and users …

Offline untrusted storage with immediate detection of forking and replay attacks

M Van Dijk, J Rhodes, LFG Sarmenta… - Proceedings of the 2007 …, 2007 - dl.acm.org
We address the problemof using an untrusted server with only a trusted timestamping device
(TTD) to provide trusted storage for a large number of clients, where each client may own …

[图书][B] Global data plane: A widely distributed storage and communication infrastructure

N Mor - 2019 - search.proquest.com
With the advancement of technology, richer computation devices are making their way into
everyday life. However, such smarter devices merely act as a source and sink of information; …

Ordered Merkle Tree-a versatile data-structure for security kernels

SD Mohanty - 2013 - search.proquest.com
Hidden undesired functionality is an unavoidable reality in any complex hardware or
software component. Undesired functionality—deliberately introduced Trojan horses or …

Security key derivation in dual connectivity

PB Mallick, J Loehr - US Patent 12,137,116, 2024 - Google Patents
The disclosure relates to methods for establishing a secure communication link between a
mobile station and a secondary base station in a mobile communication system. The …

[PDF][PDF] Securing File Storage in an Untrusted Server

SD Mohanty, M Ramkumar - academia.edu
In applications such as remote file storage systems, an essential component of cloud
computing systems, users are required to rely on untrustworthy servers. We outline an …