152
Voted
CODASPY
13 years 8 months ago
2012
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
161
click to vote
ESORICS
13 years 2 months ago
2012 Springer
Tracking information flow in dynamic languages remains an open challenge. It might seem natural to address the challenge by runtime monitoring. However, there are well-known funda...
132
Voted
CODASPY
13 years 8 months ago
2012
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
120
click to vote
ESORICS
13 years 2 months ago
2012 Springer
Given the sensitive nature of health data, privacy of eHealth systems is of prime importance. An eHealth system must enforce that users remain private, even if they are bribed or c...
112
click to vote
ESORICS
13 years 2 months ago
2012 Springer
Abstract. Given the requirements of fast processing and the complexity of RF ranging systems, distance bounding protocols have been challenging to implement so far; only few design...
|