Results 1 - 10
of
360
Scalable ID/Locator Resolution for the IoT
"... Abstract—Identifier-locator separation is a mechanism that has been used successfully to support fine-grain object mobility and persistence. Support for legacy identification systems is seen as critical for the rapid adoption of the IoT. Thus, network-based identifier resolution and meta-data discov ..."
Abstract
- Add to MetaCart
-data discovery services are already widely recognized as one of the core ingredients of the IoT architecture. This paper introduces a secure and scalable approach for the provision of such services derived as an application of the Handle System, which is extended with the components required for ID
An Evaluation Framework for Adaptive Security for the IoT in eHealth
"... Abstract—We present an assessment framework to evaluate adaptive security algorithms specifically for the Internet of Things (IoT) in eHealth applications. The successful deployment of the IoT depends on ensuring security and privacy, which need to adapt to the processing capabilities and resource u ..."
Abstract
- Add to MetaCart
use of the IoT. We develop a framework for the assessment and validation of context-aware adaptive security solutions for the IoT in eHealth that can quantify the characteristics and requirements of a situation. We present the properties to be fulfilled by a scenario to assess and quantify
Research Article Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT
"... Copyright © 2014 Yunchuan Guo et al.This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Access control is a key technology in providing s ..."
Abstract
- Add to MetaCart
security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet
Whom You Know Matters: Venture Capital Networks and Investment Performance,
- Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract
-
Cited by 138 (8 self)
- Add to MetaCart
securities (Benveniste and Spindt (1989), Cornelli and Goldreich (2001)). In the corporate loan market, banks often prefer syndicating loans with other banks over being the sole lender. Similarly, in the primary equity and bond markets, banks tend to co-underwrite securities offerings with banks they have
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
- In MobiCom ’08
, 2008
"... Securing communications requires the establishment of cryptographic keys, which is challenging in mobile scenarios where a key management infrastructure is not always present. In this paper, we present a protocol that allows two users to establish a common cryptographic key by exploiting special pro ..."
Abstract
-
Cited by 119 (3 self)
- Add to MetaCart
properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. The established key can then be used to support security services (such as encryption) between two users. Our algorithm uses level-crossings and quantization to extract
Secure Space Computing with Exertions
"... Abstract–Exertion-oriented space computing is a valuable advance in distributed and parallel computing seeing as it abstracts out several major problems in distributed computing, such as load balancing and mutual exclusion. The main problem with space computing is that of security due to the fact th ..."
Abstract
- Add to MetaCart
Abstract–Exertion-oriented space computing is a valuable advance in distributed and parallel computing seeing as it abstracts out several major problems in distributed computing, such as load balancing and mutual exclusion. The main problem with space computing is that of security due to the fact
Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords
, 2001
"... There has been much interest in password-authenticated key-exchange protocols which remain secure even when users choose passwords from a very small space of possible passwords (say, a dictionary of English words). Under this assumption, one must be careful to design protocols which cannot be broken ..."
Abstract
-
Cited by 114 (12 self)
- Add to MetaCart
There has been much interest in password-authenticated key-exchange protocols which remain secure even when users choose passwords from a very small space of possible passwords (say, a dictionary of English words). Under this assumption, one must be careful to design protocols which cannot
Automated Validation of Security-sensitive Web
"... Abstract—We formalize automated analysis techniques for the validation of web services specified in BPEL and a RBAC variant tailored to BPEL. The idea is to use decidable fragments of first-order logic to describe the state space of a certain class of web services and then use state-of-the-art SMT s ..."
Abstract
- Add to MetaCart
Abstract—We formalize automated analysis techniques for the validation of web services specified in BPEL and a RBAC variant tailored to BPEL. The idea is to use decidable fragments of first-order logic to describe the state space of a certain class of web services and then use state-of-the-art SMT
Fine-grained user-space security through virtualization
- In VEE’11: Proc. 7th ACM SIGPLAN/SIGOPS Int’l conf. Virtual execution environments (2011
"... This paper presents an approach to the safe execution of applications based on software-based fault isolation and policy-based system call authorization. A running application is encapsulated in an additional layer of protection using dynamic binary translation in user-space. This virtualization lay ..."
Abstract
-
Cited by 24 (13 self)
- Add to MetaCart
validates every system call based on the given arguments and the location of the system call. Depending on the userloadable policy and an extensible handler mechanism the framework decides whether a system call is allowed, rejected, or redirect to a specific user-space handler in the virtualization layer
Securing wireless systems via lower layer enforcements
- in Proceedings of the 5th ACM workshop on Wireless security, 2006
"... Although conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, these techniques do not directly leverage the unique properties of the wireless domain to address security threats. The properties of the wireless medium are a powerful source ..."
Abstract
-
Cited by 62 (2 self)
- Add to MetaCart
of domain-specific information that can complement and enhance traditional security mechanisms. In this paper, we propose to utilize the fact that the radio channel decorrelates rapidly in space, time and frequency in order to to establish new forms of authentication and confidentiality that operate
Results 1 - 10
of
360