Results 41 to 50 of about 1,916,317 (370)

Coded Computing for Secure Boolean Computations [PDF]

open access: yesIEEE Journal on Selected Areas in Information Theory, 2021
The growing size of modern datasets necessitates splitting a large scale computation into smaller computations and operate in a distributed manner. Adversaries in a distributed system deliberately send erroneous data in order to affect the computation for their benefit.
Chien-Sheng Yang, A. Salman Avestimehr
openaire   +3 more sources

Keamanan pada Grid Computing~Survey Paper

open access: yesElkawnie: Journal of Islamic Science and Technology, 2015
Grid computing provides high computing power, enormous data storage, and collaboration possibilities to its users. Grid computing is currently in the midst of evolving standards, inheriting and customizing from those developed in the high performance ...
Ghufran Ibnu Yasa
doaj   +1 more source

Serverless computing: a security perspective

open access: yesJournal of Cloud Computing, 2022
AbstractIn this article we review the current serverless architectures, abstract and categorize their founding principles, and provide an in-depth security analysis. In particular, we: show the security shortcomings of the analyzed serverless architectural paradigms; point to possible countermeasures; and, highlight several research directions for ...
Marin, Eduard   +2 more
openaire   +3 more sources

Proposed Method to Enhance the Security of Blowfish Algorithm [PDF]

open access: yesEngineering and Technology Journal, 2011
The selective application of technological and related procedural safeguards is an important responsibility of every organization in providing adequate security to its electronic data systems.
Shaimaa H. Shaker
doaj   +1 more source

YOLOAL: Focusing on the Object Location for Detection on Drone Imagery

open access: yesIEEE Access, 2023
Object detection in drone-captured scenarios, which can be considered as a task of detecting dense small objects, is still a challenge. Drones navigate at different altitudes, causing significant changes in the size of the detected objects and posing a ...
Xinting Chen   +4 more
doaj   +1 more source

On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting [PDF]

open access: yesIEEE Transactions on Dependable and Secure Computing, Volume 12, Issue 4 (2015), pp. 485 - 490, 2014
The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierarchical key assignment schemes has been traditionally considered in two different settings, i.e., the unconditionally secure and the ...
arxiv   +1 more source

Neural network based single index evaluation for SQL injection attack detection in health care data

open access: yesMeasurement: Sensors, 2023
In recent years, there are a lot of security risks in the network, and there is the combination intersection between the computer network security problems and security evaluation.
N. Nagabhooshanam   +4 more
doaj  

Some Fundamental Cybersecurity Concepts

open access: yesIEEE Access, 2014
The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios.
Kelce S. Wilson, Muge Ayse Kiy
doaj   +1 more source

A Multi-Vocal Review of Security Orchestration [PDF]

open access: yesACM Comput. Surv. 52, 2, Article 37 (April 2019), 45 pages, 2020
Organizations use diverse types of security solutions to prevent cyberattacks. Multiple vendors provide security solutions developed using heterogeneous technologies and paradigms. Hence, it is a challenging rather impossible to easily make security solutions to work an integrated fashion. Security orchestration aims at smoothly integrating multivendor
arxiv   +1 more source

Abstract Model Counting: A Novel Approach for Quantification of Information Leaks [PDF]

open access: yes, 2014
acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo theories, symbolic execution location: Kyoto, Japan numpages: 10acmid: 2590328 keywords: model checking, quantitative information flow, satisfiability modulo ...
ASIA CCS '14 Proceedings of the 9th ACM symposium on Information, computer and communications security   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy