Secure‐CamFlow: a device‐oriented security model to assist information flow control systems in cloud environments for IoTs

A Khurshid, AN Khan, FG Khan, M Ali… - Concurrency and …, 2019 - Wiley Online Library
Recent developments in the cloud technologies have motivated the migration of distributed
large systems, specifically the Internet of Things to the cloud architecture. Since Internet of …

IoT-based big data secure transmission and management over cloud system: A healthcare digital twin scenario

CL Stergiou, MP Koidou, KE Psannis - Applied Sciences, 2023 - mdpi.com
The Internet of Things (IoT) was introduced as a recently developed technology in the
telecommunications field. It is a network made up of real-world objects, things, and gadgets …

Offering security diagnosis as a service for cloud SaaS applications

M Elsayed, M Zulkernine - Journal of information security and applications, 2019 - Elsevier
With the maturity of service-oriented architecture (SOA), microservices architecture, and Web
technologies, web services have become critical components of Software as a Service …

Guarding serverless applications with Kalium

DS Jegan, L Wang, S Bhagat, M Swift - 32nd USENIX Security …, 2023 - usenix.org
As an emerging application paradigm, serverless computing attracts attention from more and
more adversaries. Unfortunately, security tools for conventional web applications cannot be …

An ecosystem and IoT device architecture for building trust in the industrial data space

GS Brost, M Huber, M Weiß, M Protsenko… - Proceedings of the 4th …, 2018 - dl.acm.org
The most recent and prominent advances in industrial computing include the growing
interconnectivity of cyber-physical devices, as well as the increasing variety of complex …

Disprotrack: Distributed provenance tracking over serverless applications

U Satapathy, R Thakur… - … -IEEE Conference on …, 2023 - ieeexplore.ieee.org
Provenance tracking has been widely used in the recent literature to debug system
vulnerabilities and find the root causes behind faults, errors, or crashes over a running …

Guarding serverless applications with seclambda

DS Jegan, L Wang, S Bhagat, T Ristenpart… - arXiv preprint arXiv …, 2020 - arxiv.org
As an emerging application paradigm, serverless computing attracts attention from more and
more attackers. Unfortunately, security tools for conventional applications cannot be easily …

Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things

J Singh, T Pasquier, J Bacon, J Powles… - Proceedings of the 17th …, 2016 - dl.acm.org
Internet of Things (IoT) applications, systems and services are subject to law. We argue that
for the IoT to develop lawfully, there must be technical mechanisms that allow the …

System auditing for real-time systems

A Bansal, A Kandikuppa, M Hasan, CY Chen… - ACM Transactions on …, 2023 - dl.acm.org
System auditing is an essential tool for detecting malicious events and conducting forensic
analysis. Although used extensively on general-purpose systems, auditing frameworks have …

Enhancing the security & privacy of wearable brain-computer interfaces

Z Tarkhani, L Qendro, MOC Brown, O Hill… - arXiv preprint arXiv …, 2022 - arxiv.org
Brain computing interfaces (BCI) are used in a plethora of safety/privacy-critical applications,
ranging from healthcare to smart communication and control. Wearable BCI setups typically …