Filters








1,293 Hits in 4.9 sec

Single-level integrity and confidentiality protection for distributed shared memory multiprocessors

Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin
2008 High-Performance Computer Architecture  
In this work we propose a new and efficient memory encryption and authentication solution for protecting the confidentiality and integrity of data in a DSM system.  ...  Then this processor will encrypt, sign, and communicate the data to the requesting processor which will decrypt and authenticate the data again, all using processor-to-processor protection mechanisms.  ...  Introduction Computer users are becoming increasingly aware of and concerned for the security of their computer systems.  ... 
doi:10.1109/hpca.2008.4658636 dblp:conf/hpca/RogersYCPS08 fatcat:hiv72zl6xfgr5hm7qdkixrpriq

Transport layer security: how much does it really cost?

G. Apostolopoulos, V. Peris, D. Saha
1999 IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320)  
The Secure Sockets Layer (SSL) protocol provides this capability and it is the most widely used transport layer security protocol.  ...  Since SSL is primarily used to secure web transactions, we use the SPECWeb96 benchmark suitably modified for use with the SSL protocol.  ...  This can take quite a while and so, for light loads, there is hardly any apparent reduction in latency even when there is session reuse.  ... 
doi:10.1109/infcom.1999.751458 dblp:conf/infocom/ApostolopoulosPS99 fatcat:rvzhojgvb5bk5gq36xowhhut74

Mobile Cloud Computing: Taxonomy and Challenges

Ahmed Aliyu, Abdul Hanan Abdullah, Omprakash Kaiwartya, Syed Hamid Hussain Madni, Usman Mohammed Joda, Abubakar Ado, Muhammad Tayyab
2020 Journal of Computer Networks and Communications  
Therefore, taxonomy for MCC is presented considering major themes of research including energy-aware, security, applications, and QoS-aware developments.  ...  The issues include energy efficiency in MCC, secured MCC, user-satisfied applications and Quality of Service-aware MCC (QoS).  ...  Acknowledgments e research, whose summary has been provided in the abstract, was supported by the Ministry of Education Malaysia (MOE) and conducted in collaboration with Research Management Center (RMC  ... 
doi:10.1155/2020/2547921 fatcat:b3gjy7v6cvbfxlvdmghaqksciq

On Encrypting and Signing Binary XML Messages in the Wireless Environment

Jaakko Kangasharju, Tancred Lindholm, Sasu Tarkoma
2006 2006 IEEE International Conference on Web Services (ICWS'06)  
However, an alternate serialization format is not easily made compatible with XML security features such as encryption and signing.  ...  In the wireless world there has recently been much interest in alternate serialization formats for XML data, mostly driven by the weak capabilities of both devices and networks.  ...  XML Encryption also permits transformations to be applied, but these are performed only on referenced URIs to produce the actual encrypted bytes for the decrypter, and not on decrypted data.  ... 
doi:10.1109/icws.2006.95 dblp:conf/icws/KangasharjuLT06 fatcat:et6vpdyn4rcitbr6hzkwqv624q

Adaptive Security for Intelligent Transport System Applications

Muhammad Awais Javed, Elyes Ben Hamida, Ala Al-Fuqaha, Bharat Bhargava
2018 IEEE Intelligent Transportation Systems Magazine  
We further present future opportunities to optimize the security-QoS balance for ITS applications.  ...  Using an experimental test-bed, we evaluate the standard compliant security processing delays, develop an online tool that presents detailed security benchmark results, and study the impact of security  ...  procedure, three parameters are important including security overhead, ENCAP delay (for signature/encryption operations) at the transmitter, and DECAP delay (for security verification/decryption) at the  ... 
doi:10.1109/mits.2018.2806636 fatcat:uuagwiyyafdnjn4ptzwc6a7vue

MACsec Layer 2 Security in HSR Rings in Substation Automation Systems

Jesús Lázaro, Armando Astarloa, José Araujo, Naiara Moreira, Unai Bidarte
2017 Energies  
At the lower level, added security must not interfere with the redundancy and the latency required for the real-time substation automation communications.  ...  This point-to-point securization happens at level 2, and this means that higher level protocols or applications are completely unaffected by the security protocol.  ...  As in the previous case, this means that non security aware equipment may be used and that the standard HSR latency is applied. At the same time, all communication can be secured if desired.  ... 
doi:10.3390/en10020162 fatcat:53lfon25ofgbbnzsa5tquvn4bq

Architecture For Data Management

Marko Vukolic
2015 Zenodo  
We survey security and dependability technologies and discuss designs for the overall unifying architecture for data management that serves as an umbrella for different security and dependability data  ...  Specifically the document lays out the architecture for data privacy, secure sharing schemes, geo-replication and fault and disaster tolerance for SUPERCLOUD data management.  ...  Recently, and within the context of SUPERCLOUD, we conducted an extensive experimental study to assess which of the well-know optimizations proposed for improving the latency of SMR protocols on wide-area  ... 
doi:10.5281/zenodo.49788 fatcat:5oup2d7sk5dm7efj77pjvg2bru

A measurement study of offloading virtual network functions to the edge

S. R. Chaudhry, P. Liu, X. Wang, V. Cahill, M. Collier
2021 Journal of Supercomputing  
We experimentally demonstrate reduced VNF execution latency and energy consumption for a real-time video streaming application in comparison with a software-only baseline.  ...  This approach has been validated by practical use cases with both TCP and UDP as underlying protocol on a physical testbed environment.  ...  The edge server application serves as client and server for parsing the data, encrypting/decrypting and timestamping for latency measurements.  ... 
doi:10.1007/s11227-021-03907-0 fatcat:zsfyj6vxj5fo5p6rwps6fttb34

Improving Memory Encryption Performance in Secure Processors

Jun Yang, Lan Gao, Youtao Zhang
2005 IEEE transactions on computers  
Due to the widespread software piracy and virus attacks, significant efforts have been made to improve security for computer systems.  ...  In this design, the program and data are stored in an encrypted format outside the CPU boundary. The decryption is carried out after they are fetched from memory and before they are used by the CPU.  ...  Other Security and Implementation Issues Context switching. One of the difficulties we realized is to handle a situation in context switching.  ... 
doi:10.1109/tc.2005.80 fatcat:n5npyyer3zdm3omvztwnk2gszy

The case for crypto protocol awareness inside the OS kernel

Matthew Burnside, Angelos D. Keromytis
2005 SIGARCH Computer Architecture News  
We describe our prototype implementation for the OpenBSD operating system and quantify its performance implications.  ...  In this way, we can reduce the number of system calls and context switches to a small constant number, and the amount of data copying that involves the web server by 100%.  ...  Conclusions Cryptographic protocols are a fundamental building block for securing the Internet.  ... 
doi:10.1145/1055626.1055635 fatcat:fogjhb2y7vhp3aqnwfqrc3i3oq

A security infrastructure for massive mobile data distribution

Jesseildo Figueredo Goncalves, Francisco José da Silva e Silva, Rafael Oliveira Vasconcelos, Gustavo Luiz Bastos Baptista, Markus Endler
2013 Proceedings of the 11th ACM international symposium on Mobility management and wireless access - MobiWac '13  
This work presents a data distribution layer based on the OMG DDS standard, developed to enforce CIA for data distribution through the usage of PKI and symmetric cryptography.  ...  Examples of those applications include fleet management, workforce coordination, Intelligent Transportation Systems, cooperative mobile robots, rescue and emergency management, and environmental surveillance  ...  In this context, each topic identified by a tag has a corresponding symmetric key, used to encrypt and decrypt the data published on it.  ... 
doi:10.1145/2508222.2508237 dblp:conf/mobiwac/GoncalvesSVBE13 fatcat:z2qnzhh44jc6fcllnlakcocdpe

Smart Grid ICT Research Lines out of the European Project INTEGRIS

Josep M. Selga, Guiomar Corral, Agustín Zaballos, Ramon Martín de Pozuelo
2014 Network Protocols and Algorithms  
protocols, networking at different layers, cognitive systems and storage and replication of data.  ...  The present paper presents these requirements, the solutions and results developed and tested in the FP7 European Project INTEGRIS, especially in the security domain, as well as the future challenges and  ...  In addition, we would like to thank La Salle (Universitat Ramon Llull) for their support.  ... 
doi:10.5296/npa.v6i2.5439 fatcat:i2xvbcdiyjepxn5g6sn3ayoqzq

Towards Edge-assisted Internet of Things: From Security and Efficiency Perspectives [article]

Jianbing Ni, Xiaodong Lin, Xuemin Shen
2019 arXiv   pre-print
We then study the security, privacy and efficiency challenges in data processing for mobile edge computing, and discuss the opportunities to enhance data security and improve computational efficiency with  ...  Although the advance of mobile edge computing on service latency is studied solidly, security and efficiency on data usage in mobile edge computing have not been clearly identified.  ...  While data encryption standards and security protocols, e.g., AES CBC, RFC 5246 and IEEE SA-1735, can achieve end-to-end data confidentiality, they also constrict the pre- processing on the encrypted data  ... 
arXiv:1902.07094v1 fatcat:j5tq4s4dhzddjol5acheyudfrq

Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

Mahmoud Hashem Eiza, Qi Shi, Angelos Marnerides, Thomas Owens
2016 2016 IEEE International Conference on Communications (ICC)  
) protocol for V2G networks.  ...  In this paper, we employ certificate-less public key cryptography in synergy with the restrictive partially blind signature technique to construct a secure and privacy-aware proxy mobile IPv6 (SP-PMIPv6  ...  To rectify the above problems, in this paper, a secure and privacy-aware PMIPv6 (SP-PMIPv6) protocol for V2G networks is proposed.  ... 
doi:10.1109/icc.2016.7510934 dblp:conf/icc/EizaSMO16 fatcat:e32it6t7dbee5gs6a4574gaq4i

Security in Intelligent Transport Systems for Smart Cities: From Theory to Practice

Muhammad Javed, Elyes Ben Hamida, Wassim Znaidi
2016 Sensors  
delays, packet and cryptographic losses, and reduced safety awareness in safety applications.  ...  Finally, we summarize the insights gained from the simulation results and discuss open research challenges for efficient working of security in ITS applications of smart cities.  ...  Elliptic Curve Integrated Encryption Scheme (ECIES) with Advanced Encryption Standard (AES) The second security algorithm is ECIES with AES for encrypting and decrypting exchanged messages, and whose objective  ... 
doi:10.3390/s16060879 pmid:27314358 pmcid:PMC4934305 fatcat:7nshke6ntbe57cysndaxy22snu
« Previous Showing results 1 — 15 out of 1,293 results