Dr. Aid: Supporting Data-governance Rule Compliance for Decentralized Collaboration in an Automated Way

R Zhao, M Atkinson, P Papapanagiotou… - Proceedings of the …, 2021 - dl.acm.org
Collaboration across institutional boundaries is widespread and increasing today. It
depends on federations sharing data that often have governance rules or external …

Cobweb: Practical remote attestation using contextual graphs

F Wang, Y Joung, J Mickens - Proceedings of the 2nd Workshop on …, 2017 - dl.acm.org
In theory, remote attestation is a powerful primitive for building distributed systems atop
untrusting peers. Unfortunately, the canonical attestation framework defined by the Trusted …

ProvMark: a provenance expressiveness benchmarking system

SC Chan, J Cheney, P Bhatotia, T Pasquier… - Proceedings of the 20th …, 2019 - dl.acm.org
System level provenance is of widespread interest for applications such as security
enforcement and information protection. However, testing the correctness or completeness …

[HTML][HTML] 基于ARM 指针认证的信息流控制系统

张立强, 陈青松, 严飞 - 郑州大学学报(理学版), 2021 - xml-data.org
为了解决物联网设备中的安全隔离和隐私数据泄露问题, 对类Unix 操作系统线程中的信息流
控制进行研究, 基于ARM 指针认证的硬件安全扩展和分散式信息流控制模型 …

Estimation of vegetation fractional coverage in Lugu Lake based on the dimidiate pixel model

L Huifen, M Fang, Y Chengming - 2013 Fifth International …, 2013 - ieeexplore.ieee.org
This paper tested the ability of the dimidiate pixel model on extraction of the changes about
vegetation fractional coverage vegetation includes all plant communities that cover the …

Towards a computer-interpretable actionable formal model to encode data governance rules

R Zhao, M Atkinson - 2019 15th International Conference on …, 2019 - ieeexplore.ieee.org
With the needs of science and business, data sharing and re-use has become an intensive
activity for various areas. In many cases, governance imposes rules concerning data use …

Container-native Managed Data Sharing

K Onoue, M Ueno, Y Noma - Journal of Information Processing, 2023 - jstage.jst.go.jp
Cross-industrial collaboration can yield disruptive innovations. However, there are fears
regarding data sharing across different organizations. Even if data providers make contracts …

Research on label based data flow control mechanism

R Xie, X Fan, J Zhu, G Shi, J Lou… - 2021 IEEE Sixth …, 2021 - ieeexplore.ieee.org
Aiming at the problem of low evaluation efficiency caused by complex and large number of
policies in the complex network, in view of the characteristics of a label are flexible …

[图书][B] Practical and Secure Architectures Using Ephemeral Cloud Environments

I Polinsky - 2023 - search.proquest.com
Web services are a core component behind many of our daily tasks. The ability for
developers to create applications that are accessible from a range of devices across the …

Ellipsis: Towards Efficient System Auditing for Real-Time Systems

A Bansal, A Kandikuppa, CY Chen, M Hasan… - arXiv preprint arXiv …, 2022 - arxiv.org
System auditing is a powerful tool that provides insight into the nature of suspicious events
in computing systems, allowing machine operators to detect and subsequently investigate …