• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 360
Next 10 →

Scalable ID/Locator Resolution for the IoT

by George Roussos, Paul Chartier
"... Abstract—Identifier-locator separation is a mechanism that has been used successfully to support fine-grain object mobility and persistence. Support for legacy identification systems is seen as critical for the rapid adoption of the IoT. Thus, network-based identifier resolution and meta-data discov ..."
Abstract - Add to MetaCart
-data discovery services are already widely recognized as one of the core ingredients of the IoT architecture. This paper introduces a secure and scalable approach for the provision of such services derived as an application of the Handle System, which is extended with the components required for ID

An Evaluation Framework for Adaptive Security for the IoT in eHealth

by Wolfgang Leister, Norsk Regnesentral, Stefan Poslad, Mohamed Hamdi, Habtamu Abie, Arild Torjusen
"... Abstract—We present an assessment framework to evaluate adaptive security algorithms specifically for the Internet of Things (IoT) in eHealth applications. The successful deployment of the IoT depends on ensuring security and privacy, which need to adapt to the processing capabilities and resource u ..."
Abstract - Add to MetaCart
use of the IoT. We develop a framework for the assessment and validation of context-aware adaptive security solutions for the IoT in eHealth that can quantify the characteristics and requirements of a situation. We present the properties to be fulfilled by a scenario to assess and quantify

Research Article Spatiotemporal Access Model Based on Reputation for the Sensing Layer of the IoT

by Yunchuan Guo, Lihua Yin, Chao Li, Junyan Qian
"... Copyright © 2014 Yunchuan Guo et al.This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Access control is a key technology in providing s ..."
Abstract - Add to MetaCart
security in the Internet of Things (IoT). The mainstream security approach proposed for the sensing layer of the IoT concentrates only on authentication while ignoring the more general models. Unreliable communications and resource constraints make the traditional access control techniques barely meet

Whom You Know Matters: Venture Capital Networks and Investment Performance,

by Yael Hochberg , Alexander Ljungqvist , Yang Lu , Steve Drucker , Jan Eberly , Eric Green , Yaniv Grinstein , Josh Lerner , Laura Lindsey , Max Maksimovic , Roni Michaely , Maureen O'hara , Ludo Phalippou Mitch Petersen , Jesper Sorensen , Per Strömberg Morten Sorensen , Yael Hochberg , Johnson - Journal of Finance , 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
securities (Benveniste and Spindt (1989), Cornelli and Goldreich (2001)). In the corporate loan market, banks often prefer syndicating loans with other banks over being the sole lender. Similarly, in the primary equity and bond markets, banks tend to co-underwrite securities offerings with banks they have

Radio-telepathy: extracting a secret key from an unauthenticated wireless channel

by Suhas Mathur, Narayan M, Chunxuan Ye, Alex Reznik - In MobiCom ’08 , 2008
"... Securing communications requires the establishment of cryptographic keys, which is challenging in mobile scenarios where a key management infrastructure is not always present. In this paper, we present a protocol that allows two users to establish a common cryptographic key by exploiting special pro ..."
Abstract - Cited by 119 (3 self) - Add to MetaCart
properties of the wireless channel: the underlying channel response between any two parties is unique and decorrelates rapidly in space. The established key can then be used to support security services (such as encryption) between two users. Our algorithm uses level-crossings and quantization to extract

Secure Space Computing with Exertions

by Daniel Kerr, Michael Sobolewski
"... Abstract–Exertion-oriented space computing is a valuable advance in distributed and parallel computing seeing as it abstracts out several major problems in distributed computing, such as load balancing and mutual exclusion. The main problem with space computing is that of security due to the fact th ..."
Abstract - Add to MetaCart
Abstract–Exertion-oriented space computing is a valuable advance in distributed and parallel computing seeing as it abstracts out several major problems in distributed computing, such as load balancing and mutual exclusion. The main problem with space computing is that of security due to the fact

Efficient Password-Authenticated Key Exchange using Human-Memorable Passwords

by Jonathan Katz, Rafail Ostrovsky, Moti Yung , 2001
"... There has been much interest in password-authenticated key-exchange protocols which remain secure even when users choose passwords from a very small space of possible passwords (say, a dictionary of English words). Under this assumption, one must be careful to design protocols which cannot be broken ..."
Abstract - Cited by 114 (12 self) - Add to MetaCart
There has been much interest in password-authenticated key-exchange protocols which remain secure even when users choose passwords from a very small space of possible passwords (say, a dictionary of English words). Under this assumption, one must be careful to design protocols which cannot

Automated Validation of Security-sensitive Web

by Alberto Calvi, Silvio Ranise
"... Abstract—We formalize automated analysis techniques for the validation of web services specified in BPEL and a RBAC variant tailored to BPEL. The idea is to use decidable fragments of first-order logic to describe the state space of a certain class of web services and then use state-of-the-art SMT s ..."
Abstract - Add to MetaCart
Abstract—We formalize automated analysis techniques for the validation of web services specified in BPEL and a RBAC variant tailored to BPEL. The idea is to use decidable fragments of first-order logic to describe the state space of a certain class of web services and then use state-of-the-art SMT

Fine-grained user-space security through virtualization

by Thomas R. Gross - In VEE’11: Proc. 7th ACM SIGPLAN/SIGOPS Int’l conf. Virtual execution environments (2011
"... This paper presents an approach to the safe execution of applications based on software-based fault isolation and policy-based system call authorization. A running application is encapsulated in an additional layer of protection using dynamic binary translation in user-space. This virtualization lay ..."
Abstract - Cited by 24 (13 self) - Add to MetaCart
validates every system call based on the given arguments and the location of the system call. Depending on the userloadable policy and an extensible handler mechanism the framework decides whether a system call is allowed, rejected, or redirect to a specific user-space handler in the virtualization layer

Securing wireless systems via lower layer enforcements

by Zang Li, Wenyuan Xu, Rob Miller - in Proceedings of the 5th ACM workshop on Wireless security, 2006
"... Although conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, these techniques do not directly leverage the unique properties of the wireless domain to address security threats. The properties of the wireless medium are a powerful source ..."
Abstract - Cited by 62 (2 self) - Add to MetaCart
of domain-specific information that can complement and enhance traditional security mechanisms. In this paper, we propose to utilize the fact that the radio channel decorrelates rapidly in space, time and frequency in order to to establish new forms of authentication and confidentiality that operate
Next 10 →
Results 1 - 10 of 360
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University