• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 134
Next 10 →

Secure Multi-Cloud Storage Using Elastic Scattered Storage and Scalable Auditing

by Durairaj Moorthy, Rasekar C
"... Abstract — Cloud storage facilitates users to store data remotely and benefits enterprise network or organization by minimizing the complexity of local hardware and software management. Despite the understandable on-demands, an infrastructure based services exposes user physical possession of outsou ..."
Abstract - Add to MetaCart
of outsourced data which certainly creates new security threats affecting data accuracy in cloud. In order to address the emerging problem against secure and reliable cloud storage, this paper proposes an elastic scattered storage scalability auditing (ESSSA) method, comprising homomorphic token and distributed

Single-Packet IP Traceback

by Alex C. Snoeren, Student Member, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Beverly Schwartz, Craig Partridge, Stephen T. Kent, W. Timothy Strayer, Senior Member , 2002
"... The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packet's origin, wide-spread packet forwarding techniques such as NAT and encapsulation may obscure the packet's true source. Te ..."
Abstract - Cited by 218 (4 self) - Add to MetaCart
. Techniques have been developed to determine the source of large packet flows, but, to date, no system has been presented to track individual packets in an efficient, scalable fashion. We present a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace

Finding Security Vulnerabilities in Java Applications with Static Analysis

by V. Benjamin Livshits , Monica S. Lam , 2005
"... This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks. These vulnerabilities stem from unchecked input, which is widely recognized as the most common source of securi ..."
Abstract - Cited by 169 (3 self) - Add to MetaCart
of security vulnerabilities in Web applications. We propose a static analysis approach based on a scalable and precise points-to analysis. In our system, user-provided specifications of vulnerabilities are automatically translated into static analyzers. Our approach finds all vulnerabilities matching a

AURIC: A Scalable and Highly Reusable SLA Compliance Auditing Framework

by Burkhard Hasan , Stiller
"... Abstract. Service Level Agreements (SLA) are needed to allow business interactions to rely on Internet services. Service Level Objectives (SLO) specify the committed performance level of a service. Thus, SLA compliance auditing aims at verifying these commitments. Since SLOs for various application ..."
Abstract - Add to MetaCart
application services and end-to-end performance definitions vary largely, automated auditing of SLA compliances poses the challenge to an auditing framework. Moreover, end-to-end performance data are potentially large for a provider with many customers. Therefore, this paper presents a scalable and highly

Scalable and Flexible Access Control with Secure Data Auditing in Cloud Computing

by Devi D, Arun P S
"... Abstract — Cloud computing, which enables on demand network access to shared pool of resources is the latest trend in today’s IT industry. Among different services provided by cloud, cloud storage service allows the data owners to store and share their data through cloud and thus become free from th ..."
Abstract - Add to MetaCart
encryption schemes face difficulties. Among them, Hierarchical Attribute Set Based Encryption (HASBE) provides scalable, flexible and fine grained access control as well as easy user revocation. It is an extended form of Attribute Set Based Encryption (ASBE) with a hierarchical structure of users. But from

Semantic annotation and retrieval of music and sound effects

by Douglas Turnbull, Student Member, Luke Barrington, David Torres, Gert Lanckriet, Table I - IEEE TASLP , 2008
"... Abstract—We present a computer audition system that can both annotate novel audio tracks with semantically meaningful words and retrieve relevant tracks from a database of unlabeled audio content given a text-based query. We consider the related tasks of content-based audio annotation and retrieval ..."
Abstract - Cited by 128 (30 self) - Add to MetaCart
Abstract—We present a computer audition system that can both annotate novel audio tracks with semantically meaningful words and retrieve relevant tracks from a database of unlabeled audio content given a text-based query. We consider the related tasks of content-based audio annotation and retrieval

A Highly Available, Scalable ITV System

by Michael N. Nelson, Mark Linton, Susan Owicki , 1995
"... As part of Time Warner's interactive TV trial in Orlando, Florida, we have implemented mechanisms for the construction of highly available and scalable system services and applications. Our mechanisms rely on an underlying distributed objects architecture, similar to Spring[1]. We have extended ..."
Abstract - Cited by 17 (0 self) - Add to MetaCart
As part of Time Warner's interactive TV trial in Orlando, Florida, we have implemented mechanisms for the construction of highly available and scalable system services and applications. Our mechanisms rely on an underlying distributed objects architecture, similar to Spring[1]. We have

Andromeda: Accurate and scalable security analysis of web applications

by Marco Pistoia, Patrick Cousot, Radhia Cousot, Salvatore Guarnieri - In FASE , 2013
"... Abstract. Security auditing of industry-scale software systems mandates automation. Static taint analysis enables deep and exhaustive tracking of suspicious data flows for detection of potential leakage and integrity violations, such as cross-site scripting (XSS), SQL injection (SQLi) and log forgin ..."
Abstract - Cited by 19 (1 self) - Add to MetaCart
Abstract. Security auditing of industry-scale software systems mandates automation. Static taint analysis enables deep and exhaustive tracking of suspicious data flows for detection of potential leakage and integrity violations, such as cross-site scripting (XSS), SQL injection (SQLi) and log

SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments

by Tuan Phan, Danfeng (daphne Yao
"... Abstract. Networked virtual environments (NVE) refer to the category of distributed applications that allow a large number of distributed users to interact with one or more central servers in a virtual environment setting, e.g., Second Life and multi-player online games. Recent studies identify that ..."
Abstract - Add to MetaCart
who then performs selective recomputation to verify the client’s results. Because typically NVE has a large number of players, an audit protocol needs to be scalable. Key words: networked virtual environments, algorithm, audit, integrity 1

Audit Data Reduction for Intrusion Detection

by S. Mukkamala, G. R. Tadiparthi, N. Tummala, G. Janoski
"... Intrusion Detection Systems (IDS) have become important and widely-used tools for ensuring netwrok security. Since the amount of audit data that an IDS needs to examine is very large even for a small network, audit data reduction is often a necessary task. To maximize the time performance, scalabili ..."
Abstract - Add to MetaCart
, scalability, and fast re-training or tuning of an IDS, irrelevant features in audit data must be identified and eliminated from examination by the IDS. This paper concerns ranking the importance of input features for IDS. We use the DARPA data initially provided for the KDD’99 competition and perform
Next 10 →
Results 1 - 10 of 134
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University