On security in publish/subscribe services: A survey
C Esposito, M Ciampi - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …
modern large-scale mission-critical systems. Such systems are characterized by several non …
[PDF][PDF] TrInc: Small Trusted Hardware for Large Distributed Systems.
A simple yet remarkably powerful tool of selfish and malicious participants in a distributed
system is “equivocation”: making conflicting statements to others. We present TrInc, a small …
system is “equivocation”: making conflicting statements to others. We present TrInc, a small …
Method for securing a computing device with a trusted platform module-tpm
RNDEPC CONDE, PJE VERISSIMO - US Patent App. 13/237,886, 2012 - Google Patents
0003. How much is the information inside a computer worth? In general, this question is very
hard to answer. It could be worth anything from a few cents up to several thou sand Euros …
hard to answer. It could be worth anything from a few cents up to several thou sand Euros …
Multi-user dynamic proofs of data possession using trusted hardware
SR Tate, R Vishwanathan, L Everhart - … of the third ACM conference on …, 2013 - dl.acm.org
In storage outsourcing services, clients store their data on a potentially untrusted server,
which has more computational power and storage capacity than the individual clients. In this …
which has more computational power and storage capacity than the individual clients. In this …
Mercury:{Bandwidth-Effective} Prevention of Rollback Attacks Against Community Repositories
TK Kuppusamy, V Diaz, J Cappos - 2017 USENIX Annual Technical …, 2017 - usenix.org
A popular community repository such as Docker Hub, PyPI, or RubyGems distributes tens of
thousands of software projects to millions of users. The large number of projects and users …
thousands of software projects to millions of users. The large number of projects and users …
Offline untrusted storage with immediate detection of forking and replay attacks
M Van Dijk, J Rhodes, LFG Sarmenta… - Proceedings of the 2007 …, 2007 - dl.acm.org
We address the problemof using an untrusted server with only a trusted timestamping device
(TTD) to provide trusted storage for a large number of clients, where each client may own …
(TTD) to provide trusted storage for a large number of clients, where each client may own …
[图书][B] Global data plane: A widely distributed storage and communication infrastructure
N Mor - 2019 - search.proquest.com
With the advancement of technology, richer computation devices are making their way into
everyday life. However, such smarter devices merely act as a source and sink of information; …
everyday life. However, such smarter devices merely act as a source and sink of information; …
Ordered Merkle Tree-a versatile data-structure for security kernels
SD Mohanty - 2013 - search.proquest.com
Hidden undesired functionality is an unavoidable reality in any complex hardware or
software component. Undesired functionality—deliberately introduced Trojan horses or …
software component. Undesired functionality—deliberately introduced Trojan horses or …
Security key derivation in dual connectivity
PB Mallick, J Loehr - US Patent 12,137,116, 2024 - Google Patents
The disclosure relates to methods for establishing a secure communication link between a
mobile station and a secondary base station in a mobile communication system. The …
mobile station and a secondary base station in a mobile communication system. The …
[PDF][PDF] Securing File Storage in an Untrusted Server
SD Mohanty, M Ramkumar - academia.edu
In applications such as remote file storage systems, an essential component of cloud
computing systems, users are required to rely on untrustworthy servers. We outline an …
computing systems, users are required to rely on untrustworthy servers. We outline an …