Sciweavers

582 search results - page 17 / 117
» Security and Privacy Challenges in Cloud Computing Environme...
Sort
View
94
Voted
TRUSTBUS
2007
Springer
15 years 5 months ago
The Meaning of Logs
While logging events is becoming increasingly common in computing, in communication and in collaborative environments, log systems need to satisfy increasingly challenging (if not ...
Sandro Etalle, Fabio Massacci, Artsiom Yautsiukhin
79
Voted
SOUPS
2009
ACM
15 years 6 months ago
Personal choice and challenge questions: a security and usability assessment
Challenge questions are an increasingly important part of mainstream authentication solutions, yet there are few published studies concerning their usability or security. This pap...
Mike Just, David Aspinall
93
Voted
ICISS
2009
Springer
15 years 6 months ago
A Framework for Behavior-Based Malware Analysis in the Cloud
Abstract. To ease the analysis of potentially malicious programs, dynamic behavior-based techniques have been proposed in the literature. Unfortunately, these techniques often give...
Lorenzo Martignoni, Roberto Paleari, Danilo Brusch...
INTENSIVE
2009
IEEE
15 years 6 months ago
A Service for Data-Intensive Computations on Virtual Clusters
Digital Preservation deals with the long-term storage, access, and maintenance of digital data objects. In order to prevent a loss of information, digital libraries and archives a...
Rainer Schmidt, Christian Sadilek, Ross King
92
Voted
ESORICS
2008
Springer
15 years 1 months ago
Sharemind: A Framework for Fast Privacy-Preserving Computations
Gathering and processing sensitive data is a difficult task. In fact, there is no common recipe for building the necessary information systems. In this paper, we present a provably...
Dan Bogdanov, Sven Laur, Jan Willemson