Growing a protocol

K Ramasubramanian, K Dahlgren, A Karim… - 9th USENIX Workshop …, 2017 - usenix.org
Verification is often regarded as a one-time procedure undertaken after a protocol is
specified but before it is implemented. However, in practice, protocols continually evolve …

Factors affecting information security compliance among SMEs in Cape Town

FL Lawrence - 2022 - etd.uwc.ac.za
Small and medium enterprises are depending on the use of IT systems to compete and
participate in the South African economy and also to improve the efficiency of their service …

Improved sun flow optimization (I-SFO) algorithm based de-centralized information flow control for multi-tenant cloud virtual machines

YB Gurav, BM Patil - International Journal of Advanced …, 2022 - search.proquest.com
A novel multi-tenant decentralized information flow control (MT-DIFC) model is introduced in
this research work. In cloud computing, the MT-DIFC allows a larger pool of resources to be …

An Automated Framework for Supporting Data-Governance Rule Compliance in Decentralized MIMO Contexts

R Zhao - arXiv preprint arXiv:2109.00838, 2021 - arxiv.org
We propose Dr. Aid, a logic-based AI framework for automated compliance checking of data
governance rules over data-flow graphs. The rules are modelled using a formal language …

[PDF][PDF] Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences

H Kermabon-Bobinnec, Y Jarraya, L Wang… - users.encs.concordia.ca
Known, but unpatched vulnerabilities represent one of the most concerning threats for
businesses today. The average time-to-patch of zero-day vulnerabilities remains around 100 …

Ajsage: A Intrusion Detection Scheme Based on Jump-Knowledge Connection to Graphsage

L Xu, ZC Zhao, D Zhao, X Li, X Lu, D Yan - Available at SSRN 4829967 - papers.ssrn.com
In the field of network security, attackers often utilize Advanced Persistent Threats (APT) to
conduct host-based intrusions for prolonged information gathering, penetration and to cause …

Optimal Mining on Type Control policy for Cloud Environment

Z Zhang, Z Yang, W Li, X Du - 2021 IEEE 6th International …, 2021 - ieeexplore.ieee.org
In order to strengthen the cloud system's ability to type control data resources, The
information flow control model can more effectively protect the confidentiality and integrity of …

Advancing Security Services for Cloud Applications

MAMA Elsayed - 2018 - search.proquest.com
With cloud computing taking roots, Software as a Service (SaaS) is transforming the future of
Information Technology (IT). SaaS is a modern pervasive software delivery model in the …

[PDF][PDF] DDoS Malicious Node Detection by Jaccard and Page Rank Algorithm in Cloud Environment

AH Mohammed - researchgate.net
Cloud infrastructure increases the strength of service and product based companies by
serving more users with limited infrastructure. Many of researcher are working to improve the …

Detail Study of Cloud Infrastructure Attacks and Security Techniques

S Singh BG, DS Phulre - International Journal of Innovative …, 2021 - papers.ssrn.com
Cloud computing is Internet-based computing and the next stage in the evolution of the
internet. The uses of the cloud attract different industries in the recent decade, but this brings …