Filters








8 Hits in 6.5 sec

DEMO

Toshinori Araki, Assaf Barak, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara
2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security - CCS'16  
The design will show how this high-throughput three-party computation can be done using simple servers.  ...  The paper "High Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority" in this ACM CCS 2016 [4] presents a new protocol which its implementation carried out over 1,300,000 AESs  ...  First, we simulate the three party computation for issuing Kerberos TGT tickets by these server machines where the JMeter load test tool simulates clients.  ... 
doi:10.1145/2976749.2989035 dblp:conf/ccs/ArakiBFLNO16 fatcat:wb2ga5nyv5hutldzzk6v3wydqe

CyberGuarder: A virtualization security assurance architecture for green cloud computing

Jianxin Li, Bo Li, Tianyu Wo, Chunming Hu, Jinpeng Huai, Lu Liu, K.P. Lam
2012 Future generations computer systems  
In particular, CyberGuarder provides three different kinds of services; namely, a virtual machine security service, a virtual network security service and a policy based trust management service.  ...  His research interests include a broad range of topics related to computer security including virtualisation security, operating system security, and trusted computing.  ...  In particular, the top 10 problems relating to cloud computing are discussed, and three of them are related to the security issues.  ... 
doi:10.1016/j.future.2011.04.012 fatcat:aruwngb4prdlrdfavutbhjx6ei

Aspect-Oriented Workflow Languages [chapter]

Anis Charfi, Mira Mezini
2006 Lecture Notes in Computer Science  
and Kerberos tickets.  ...  However, they involve several heterogeneous information systems and pose high requirements w.r.t. throughput, transaction, reliability, and security.  ... 
doi:10.1007/11914853_12 fatcat:w6fjrahnyfefnbn5a7wpnjxazy

INTEGRATING SECURITY AND PRIVACY PROTECTION INTO A MOBILITY-CENTRIC INTERNET ARCHITECTURE Integrating Security and Privacy Protection into a Mobility-Centric Internet Architecture

Xiruo Liu, Xiruo Liu
unpublished
This thesis examines several of the key security challenges facing several of the emerging future Internet designs, and specifically explores aspects related to securing the MobilityFirst future Internet  ...  Notably, one of the primary hurdles challenging the continued success of the Internet is the security of the communications crossing the Internet.  ...  Kerberos is another widely used three-party key distribution protocol based on Needham-Schroeder protocol.  ... 
fatcat:pdqgsd35irhmdmoayxuz6tdndm

Privacy engineering for social networks

Jonathan Anderson, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository
2013
The protocol is designed to be secure even in the face of malicious authentication agents.  ...  It is designed to compete with the performance of today's centralised OSNs, but it does not trust centralised infrastructure to enforce security properties.  ...  As described below, these three requirements preclude traditional approaches to the security of private keys.  ... 
doi:10.17863/cam.16377 fatcat:g3dkqo7ugrc7fcnpz4d6mc2l6m

Editorial Team Manuscript Editor Advisory Board II JAQM Advisory Board

Cristian Amancei, Catalin Boja, Irina Dragan, Eugen Dumitrascu, Matthew Elbeck, Bogdan Ileanu, Miruna Marinescu, Daniel Traian, Ciprian Popescu, Aura Popa, Marius Popa, Mihai Sacala (+20 others)
unpublished
Acknowledgements This work was partially supported by the Internal Funding Program of the Shamoon College of Engineering (SCE).  ...  One of the most powerful and widely used authentication service is Kerberos Authentication Server. Kerberos is a set of protocols that can be used to authenticate access to a computer.  ...  Also, Kerberos provides real-time authentication in an insecure distributed environment. Advantages of computer network security under UNIX Unix system's strengths are numerous.  ... 
fatcat:r4jukbisc5bm7ck66rd6cyyulq

21st CERN School of Computing [article]

Carlo E Vandoni
1998
An overview of some applications of expert systems to monitoring and control will be given, as well as some alternative approaches.  ...  Expert Systems offer the means to codify and automate the use of the knowledge of the best experts in a given domain, and may provide support to monitoring, diagnosis and control tasks.  ...  for their generous support.  ... 
doi:10.5170/cern-1998-008 fatcat:pn2eegutc5gq7bo2364atduiy4

Supporting Password-Security Decisions with Data

Blase Eric Ur
2018
I also examine the relationship between users' perceptions of password security and passwords' actual security, finding that while users often correctly judge the security impact of individual password  ...  Despite decades of research into developing abstract security advice and improving interfaces, users still struggle to make passwords.  ...  Furthermore, cryptographic keys used for asymmetric secure messaging (e.g., GPG private keys), encrypted hard drives, and Windows Domain Kerberos Tickets [44] are protected by passwords.  ... 
doi:10.1184/r1/6723416 fatcat:zj5suvg2kjfmpkavs4fg6r2kvm