Results 1 to 10 of about 778,788 (194)

Computer Security: Competing Concepts [PDF]

open access: greenarXiv, 2001
This paper focuses on a tension we discovered in the philosophical part of our multidisciplinary project on values in web-browser security. Our project draws on the methods and perspectives of empirical social science, computer science, and philosophy to identify values embodied in existing web-browser security and also to prescribe changes to existing
Helen Nissenbaum   +2 more
arxiv   +3 more sources

On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, Volume 12, Issue 4 (2015), pp. 485 - 490, 2014
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierarchical key assignment schemes has been traditionally considered in two different settings, i.e., the unconditionally secure and the ...
arxiv   +1 more source

A Multi-Vocal Review of Security Orchestration [PDF]

open access: yesACM Comput. Surv. 52, 2, Article 37 (April 2019), 45 pages, 2020
Organizations use diverse types of security solutions to prevent cyberattacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security solutions to work an integrated fashion. Security orchestration aims at smoothly integrating multivendor
arxiv   +1 more source

An Overview of the Security Concerns in Enterprise Cloud Computing [PDF]

open access: yesInternational Journal of Network Security & Its Applications (IJNSA), Vol.3, No.1, January 2011, 2011
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures.
arxiv   +1 more source

A Survey of Secure Computation Using Trusted Execution Environments [PDF]

open access: yesarXiv, 2023
As an essential technology underpinning trusted computing, the trusted execution environment (TEE) allows one to launch computation tasks on both on- and off-premises data while assuring confidentiality and integrity. This article provides a systematic review and comparison of TEE-based secure computation protocols.
arxiv  

Secure Computation Framework for Multiple Data Providers Against Malicious Adversaries [PDF]

open access: yessubmission of CCS 2020, 2020
Due to the great development of secure multi-party computation, many practical secure computation schemes have been proposed. As an example, different secure auction mechanisms have been widely studied, which can protect bid privacy while satisfying various economic properties.
arxiv  

Considerations for Cloud Security Operations [PDF]

open access: yesOracle CSO Advisory Board, Cloud Security Session, January, 2016, 2016
Information Security in Cloud Computing environments is explored. Cloud Computing is presented, security needs are discussed, and mitigation approaches are listed. Topics covered include Information Security, Cloud Computing, Private Cloud, Public Cloud, SaaS, PaaS, IaaS, ISO 27001, OWASP, Secure SDLC.
arxiv  

Information Security Games: A Survey [PDF]

open access: yesarXiv, 2021
We introduce some preliminaries about game theory and information security. Then surveying a subset of the literature, we identify opportunities for future research.
arxiv  

A Generic Cognitive Dimensions Questionnaire to Evaluate the Usability of Security APIs [PDF]

open access: yesarXiv, 2017
Programmers use security APIs to embed security into the applications they develop. Security vulnerabilities get introduced into those applications, due to the usability issues that exist in the security APIs. Improving usability of security APIs would contribute to improve the security of applications that programmers develop. However, currently there
arxiv  

Computationally Bounded Robust Compilation and Universally Composable Security [PDF]

open access: yesProceedings of the 2024 IEEE Computer Security Foundations Symposium (CSF)
Universal Composability (UC) is the gold standard for cryptographic security, but mechanizing proofs of UC is notoriously difficult. A recently-discovered connection between UC and Robust Compilation (RC)$\unicode{x2014}$a novel theory of secure compilation$\unicode{x2014}$provides a means to verify UC proofs using tools that mechanize equality results.
arxiv   +1 more source

Home - About - Disclaimer - Privacy