Results 1 - 10
of
134
Secure Multi-Cloud Storage Using Elastic Scattered Storage and Scalable Auditing
"... Abstract — Cloud storage facilitates users to store data remotely and benefits enterprise network or organization by minimizing the complexity of local hardware and software management. Despite the understandable on-demands, an infrastructure based services exposes user physical possession of outsou ..."
Abstract
- Add to MetaCart
of outsourced data which certainly creates new security threats affecting data accuracy in cloud. In order to address the emerging problem against secure and reliable cloud storage, this paper proposes an elastic scattered storage scalability auditing (ESSSA) method, comprising homomorphic token and distributed
Single-Packet IP Traceback
, 2002
"... The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's origin, wide-spread packet forwarding techniques such as NAT and encapsulation may obscure the packet's true source. Te ..."
Abstract
-
Cited by 218 (4 self)
- Add to MetaCart
. Techniques have been developed to determine the source of large packet flows, but, to date, no system has been presented to track individual packets in an efficient, scalable fashion. We present a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace
Finding Security Vulnerabilities in Java Applications with Static Analysis
, 2005
"... This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These vulnerabilities stem from unchecked input, which is widely recognized as the most common source of securi ..."
Abstract
-
Cited by 169 (3 self)
- Add to MetaCart
of security vulnerabilities in Web applications. We propose a static analysis approach based on a scalable and precise points-to analysis. In our system, user-provided specifications of vulnerabilities are automatically translated into static analyzers. Our approach finds all vulnerabilities matching a
AURIC: A Scalable and Highly Reusable SLA Compliance Auditing Framework
"... Abstract. Service Level Agreements (SLA) are needed to allow business interactions to rely on Internet services. Service Level Objectives (SLO) specify the committed performance level of a service. Thus, SLA compliance auditing aims at verifying these commitments. Since SLOs for various application ..."
Abstract
- Add to MetaCart
application services and end-to-end performance definitions vary largely, automated auditing of SLA compliances poses the challenge to an auditing framework. Moreover, end-to-end performance data are potentially large for a provider with many customers. Therefore, this paper presents a scalable and highly
Scalable and Flexible Access Control with Secure Data Auditing in Cloud Computing
"... Abstract — Cloud computing, which enables on demand network access to shared pool of resources is the latest trend in today’s IT industry. Among different services provided by cloud, cloud storage service allows the data owners to store and share their data through cloud and thus become free from th ..."
Abstract
- Add to MetaCart
encryption schemes face difficulties. Among them, Hierarchical Attribute Set Based Encryption (HASBE) provides scalable, flexible and fine grained access control as well as easy user revocation. It is an extended form of Attribute Set Based Encryption (ASBE) with a hierarchical structure of users. But from
Semantic annotation and retrieval of music and sound effects
- IEEE TASLP
, 2008
"... Abstract—We present a computer audition system that can both annotate novel audio tracks with semantically meaningful words and retrieve relevant tracks from a database of unlabeled audio content given a text-based query. We consider the related tasks of content-based audio annotation and retrieval ..."
Abstract
-
Cited by 128 (30 self)
- Add to MetaCart
Abstract—We present a computer audition system that can both annotate novel audio tracks with semantically meaningful words and retrieve relevant tracks from a database of unlabeled audio content given a text-based query. We consider the related tasks of content-based audio annotation and retrieval
A Highly Available, Scalable ITV System
, 1995
"... As part of Time Warner's interactive TV trial in Orlando, Florida, we have implemented mechanisms for the construction of highly available and scalable system services and applications. Our mechanisms rely on an underlying distributed objects architecture, similar to Spring[1]. We have extended ..."
Abstract
-
Cited by 17 (0 self)
- Add to MetaCart
As part of Time Warner's interactive TV trial in Orlando, Florida, we have implemented mechanisms for the construction of highly available and scalable system services and applications. Our mechanisms rely on an underlying distributed objects architecture, similar to Spring[1]. We have
Andromeda: Accurate and scalable security analysis of web applications
- In FASE
, 2013
"... Abstract. Security auditing of industry-scale software systems mandates automation. Static taint analysis enables deep and exhaustive tracking of suspicious data flows for detection of potential leakage and integrity violations, such as cross-site scripting (XSS), SQL injection (SQLi) and log forgin ..."
Abstract
-
Cited by 19 (1 self)
- Add to MetaCart
Abstract. Security auditing of industry-scale software systems mandates automation. Static taint analysis enables deep and exhaustive tracking of suspicious data flows for detection of potential leakage and integrity violations, such as cross-site scripting (XSS), SQL injection (SQLi) and log
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments
"... Abstract. Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers in a virtual environment setting, e.g., Second Life and multi-player online games. Recent studies identify that ..."
Abstract
- Add to MetaCart
who then performs selective recomputation to verify the client’s results. Because typically NVE has a large number of players, an audit protocol needs to be scalable. Key words: networked virtual environments, algorithm, audit, integrity 1
Audit Data Reduction for Intrusion Detection
"... Intrusion Detection Systems (IDS) have become important and widely-used tools for ensuring netwrok security. Since the amount of audit data that an IDS needs to examine is very large even for a small network, audit data reduction is often a necessary task. To maximize the time performance, scalabili ..."
Abstract
- Add to MetaCart
, scalability, and fast re-training or tuning of an IDS, irrelevant features in audit data must be identified and eliminated from examination by the IDS. This paper concerns ranking the importance of input features for IDS. We use the DARPA data initially provided for the KDD’99 competition and perform
Results 1 - 10
of
134