152
Voted
CODASPY
13 years 8 months ago
2012
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
132
Voted
CODASPY
13 years 8 months ago
2012
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
143
Voted
CODASPY
13 years 8 months ago
2012
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
161
Voted
CODASPY
13 years 8 months ago
2012
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
121
Voted
CODASPY
13 years 8 months ago
2012
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
|