Search
Now showing items 1-10 of 36
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
Security Dynamics of Cloud Computing
(
Cutter Consortium
, 2009 , Article)
This paper explores various dimensions of cloud computing security. It argues that security concerns of cloud computing need to be addressed from the perspective of individual stakeholder. Security focuses of cloud computing ...
Addressing Cloud Computing in Enterprise Architecture: Issues and Challenges
(
Cutter Consortium
, 2009 , Article)
This article discusses how the characteristics of cloud computing affect the enterprise architecture in four domains: business, data, application and technology. The ownership and control of architectural components are ...
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health and itinerary planning. ...
A Novel Efficient Classwise Sparse and Collaborative Representation for Holistic Palmprint Recognition
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Palmprint recognition is an important and widely used modality in biometric systems. It has a high reliability, stability and user acceptability. Although the discriminative ability of the existing state-of-the-art holistic ...
TangleCV: Decentralized Technique for Secure Message Sharing in Connected Vehicles
(
Association for Computing Machinery, Inc
, 2019 , Conference Paper)
Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board ...
Impact of the Wireless Network's PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
We investigate the impact of the wireless network's physical layer (PHY) security and reliability on demand-side management operation in the smart grid. We assume that consumers communicate their energy demands with the ...
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged restorative methodology, are a type of implantable medical device which uses electrical stimulation to treat neurological disorders. These devices ...
A cost-aware model for risk mitigation in Cloud computing systems
(
IEEE Computer Society
, 2016 , Conference Paper)
Security is an important element in Cloud computing. Intruders may exploit clouds for their advantage. This paper presents a cost-aware model for risk mitigation in cloud computing systems. The proposed model is integrated ...
Improved relay selection for decode-and-forward cooperative wireless networks under secrecy rate maximization
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Conference Paper)
Privacy and security have an increasingly important role in wireless networks. A secure communication enables a legitimate destination to successfully retrieve information sent by a source, while it disables the eavesdropper ...