198
Voted
CODASPY
14 years 21 days ago
2012
Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
179
Voted
CODASPY
14 years 21 days ago
2012
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
182
click to vote
CODASPY
14 years 21 days ago
2012
Usage control is concerned with how data is used after access to it has been granted. As such, it is particularly relevant to end users who own the data. System implementations of...
198
click to vote
CODASPY
14 years 21 days ago
2012
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
164
click to vote
CODASPY
14 years 21 days ago
2012
Main stream operating system kernels lack a strong and reliable mechanism for identifying the running processes and binding them to the corresponding executable applications. In t...
|