A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Data-logging and supervisory control in wireless sensor networks
2009
International Journal of Sensor Networks (IJSNet)
The DEC is responsible for generating rule-based tasks in order to address information-centric issues such as data-logging, alarm & event reporting and security. ...
This paper proposes a data-logging & supervisory control architecture to manage the information gathered by the WSN and make decisions based on this information. ...
Finally, data security requires restricting control of the DEC from unauthorized users. The DSC sets up security levels of security such as administrator, operator, guest etc. ...
doi:10.1504/ijsnet.2009.028022
fatcat:beheurzie5ef7li3ofmbokd77u
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
[article]
2019
arXiv
pre-print
In this paper we propose a novel protocol that allows suppliers and grid operators to collect users' aggregate metering data in a secure and privacy-preserving manner. ...
We use secure multiparty computation to ensure privacy protection. ...
For instance, the Batcher oddeven merge sorting network requires |SM dj | × log 2 (|SM dj |) exchange gates. ...
arXiv:1801.08353v2
fatcat:5gk67zn55rf5rc3gadnmc2e3oi
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection
2019
IEEE Transactions on Smart Grid
In this paper, we propose a novel protocol that allows suppliers and grid operators to collect users' aggregate metering data in a secure and privacy-preserving manner. ...
We use secure multiparty computation to ensure privacy protection. ...
For instance, the Batcher oddeven merge sorting network requires |SM dj | × log 2 (|SM dj |) exchange gates. ...
doi:10.1109/tsg.2019.2906016
fatcat:5b3gtnez3zgzhmxvslrwsowkn4
Building Secure and Transparent Elections through Standard Operating Procedures
2008
PAR. Public Administration Review
However, basic processes and standard operating procedures have not been uniformly adopted across the states for the security of the voting systems. ...
seals, logs, and witnesses requires the establishment of appropriate processes and procedures. ...
If secure storage space with restricted access is unavailable at the pol ling place, election offi cials must provide interlocking padlocked cables to secure voting units. ...
doi:10.1111/j.1540-6210.2008.00924.x
fatcat:utfmxp5kvrcjzkanaqwydlgslu
Performance Evaluation and Operation of Enterprise Resource Planning (ERP) Software Security System
2014
International Journal of Intelligent Information Systems
ERP for the business to develop innovative services for new and existing organizations, has achieved operational excellence with streamlined logistics and manufacturing improve financial performance with ...
The applied framework has been used to map a commercial security library to the target mobile application SoC (System-of-Chip). ...
three associated arguments; O is the security-related operation performed by the principal i in a compositional contract; K is a set of security attributes used by the principal; subscript j contains ...
doi:10.11648/j.ijiis.20140305.11
fatcat:cokovldx2bhrncolsi6atrvrsi
OPEC
2022
Proceedings of the Seventeenth European Conference on Computer Systems
Bare-metal embedded systems usually lack security isolation. Attackers can subvert the whole system with a single vulnerability. ...
Our evaluation shows that OPEC can achieve the security guarantees for the privilege and resource isolation with negligible runtime overhead (average 0.23%), moderate Flash overhead (average 1.79%), and ...
After that, the OPEC-Compiler groups all the member functions callable from one operation entry to an operation and merges all needed resources to produce the resource dependency. ...
doi:10.1145/3492321.3519573
fatcat:m2o5uyxkqbegbpz5x67w6n5vbm
A Survey on TLS-Encrypted Malware Network Traffic Analysis Applicable to Security Operations Centers
2021
Applied Sciences
Recently, a majority of security operations centers (SOCs) have been facing a critical issue of increased adoption of transport layer security (TLS) encryption on the Internet, in network traffic analysis ...
To this end, in this survey article, we present existing research on NTA and related areas, primarily focusing on TLS-encrypted traffic to detect and classify malicious traffic with deployment scenarios ...
Santos, O. Network Security with NetFlow and IPFIX: Big Data Analytics for Information Security; Cisco Press: Indianapolis, IN, USA, 2015.
9. ENEA Qosmos Division. ...
doi:10.3390/app12010155
fatcat:kdkvmdkbareb7cxgy7er7ncday
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
2018
IEEE Transactions on Information Forensics and Security
Operating system kernel is often the security foundation for the whole system. ...
Unlike previous systems, FINE-CFI constructs kernel's finegrained CFG with a retrofitted context-sensitive and fieldsensitive pointer analysis, then enforces CFI with this CFG. ...
The detailed log is available in /var/log/kern.log file in the hypervisor (lines 1-6). In particular, in kern.log, we found that an error occurred in line 2 (marked with *). ...
doi:10.1109/tifs.2018.2797932
fatcat:2r2xdz7pybb6fbbfumo6upukfm
Secure data structures based on multi-party computation
2011
Proceedings of the 30th annual ACM SIGACT-SIGOPS symposium on Principles of distributed computing - PODC '11
The priority queue operations -insertion into the structure and deletion of the minimal element contained therein -both require O(log 2 n) invocations of the cryptographic primitives (secure arithmetic ...
and comparison) amortized in O(1) rounds amortized, where n is the overall number of operations performed. ...
For the case of passively secure MPC from Shamir's secret sharing scheme, the O(log 2 n) conditional swaps translate into O(log M · log 2 n) basic operations of F ABB , which in turn require O(log M · ...
doi:10.1145/1993806.1993859
dblp:conf/podc/Toft11
fatcat:pvq272j3k5dmjc6mebrznd27my
Asymptotically Tight Bounds for Composing ORAM with PIR
[chapter]
2017
Lecture Notes in Computer Science
log 3 N ) to O(log N ) where N is the number of logical data blocks. ...
We also show a Ω(log cD N ) lower bound on bandwidth blowup in the modified model involving PIR operations. ...
Our construction achieves O(log d N ) bandwidth blowup with c = O(1) blocks of client storage and PIR operations on D = d · polylog(N ) blocks. ...
doi:10.1007/978-3-662-54365-8_5
fatcat:adzojsnhwnan3dlwu57zdyxzoq
Constant Communication ORAM with Small Blocksize
2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security - CCS '15
It requires a large block size of B = Ω(log 6 N ) with large constants. ...
In this work, we address these problems and reduce the required block size to Ω(log 4 N ). We remove most of the homomorphic multiplications while maintaining O(1) communication complexity. ...
With z ∈ Θ(λ), λ ∈ ω(log N ) and L ∈ Θ(log N ), we achieve B ∈ Ω(λ · [log N · log λ + γ]). In practice, γ ∈ O(λ 3 ), so γ dominates log N · log λ. Therefore, block size B is B ∈ Ω(γλ). ...
doi:10.1145/2810103.2813701
dblp:conf/ccs/MoatazMB15
fatcat:qgcy6awkffggpeeoje4zjb23tq
More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting
[article]
2018
arXiv
pre-print
In this work, we construct a perfectly secure 3-server ORAM scheme that outperforms the best known single-server scheme by a logarithmic factor. ...
., whether the multi-server setting can be used to achieve stronger security goals or provably better efficiency than is possible in the single-server case. ...
[15] O(log N ) O(N ) Computational Kushilevitz et al. [18] O(log N · ω(1)) O(log N · ω(1)) Computational Abraham et al. [1] O(log 2 N · ω(1)) O(log 2 N · ω(1)) Statistical Our work O(log 2 N ) - Perfect ...
arXiv:1809.00825v1
fatcat:srh3i7cyfnhftbghbvhwhad43q
Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute
2017
Proceedings on Privacy Enhancing Technologies
We consider privacy-preserving computation of big data using trusted computing primitives with limited private memory. ...
In this paper, we advocate a simple approach wherein many basic algorithms (e.g., sorting) can be made privacy-preserving by adding a step that securely scrambles the data before feeding it to the original ...
O(n log 2 n) Compaction O(n) O(n) O(n log n) Selection O(n) O(n) O(n) Aggregation O(n log n) O(n log n) O(n log n) Join O(n 1 log n 1 + n 2 log n 2 ) O(n 1 log n 1 + n 2 log n 2 + l log l) O(n 1 log n ...
doi:10.1515/popets-2017-0026
dblp:journals/popets/DangDCO17
fatcat:25kvpphyyjgolcsv5refjcp5y4
Building castles out of mud
2008
Proceedings of the 15th ACM conference on Computer and communications security - CCS '08
Moreover, the client is provided with strong correctness assurances for its operations -illicit provider behavior does not go undetected. ...
We introduce a new practical mechanism for remote data storage with efficient access pattern privacy and correctness. ...
on level i is O(4 i (log log 4 i + 1)) = O(4 i log i) = O(n log log n). ...
doi:10.1145/1455770.1455790
dblp:conf/ccs/WilliamsSC08
fatcat:57quqjkmwraohoh3akueil32ae
BIOS ORAM: Improved Privacy-Preserving Data Access for Parameterized Outsourced Storage
[article]
2017
arXiv
pre-print
Our method achieves statistical security for hiding Alice's access pattern and, with high probability, achieves an I/O overhead that ranges from O(1) to O(^2 n/( n)^2), depending on these size parameters ...
, where n is the size of Alice's outsourced memory. ...
O(log n/ log B) with high probability. ...
arXiv:1709.06534v1
fatcat:g4n6waniuvc6je2s3qlqeuvhji
« Previous
Showing results 1 — 15 out of 29,915 results