Usage control enforcement-a survey

ÅA Nyre - … Conference on Availability, Reliability, and Security, 2011 - Springer
Sharing information allows businesses to take advantage of hidden knowledge, improve
work processes and cooperation both within and across organisations. Thus there is a need …

Design and implementation of an efficient framework for behaviour attestation using n-call slides

R Ismail, TA Syed, S Musa - … of the 8th International Conference on …, 2014 - dl.acm.org
We present design and implementation of behaviour based attestation of an enterprise
centric application. Remote attestation is used to measure the trustworthiness of the target …

Remote attestation of attribute updates and information flows in a ucon system

M Nauman, M Alam, X Zhang, T Ali - … , Trust 2009, Oxford, UK, April 6-8 …, 2009 - Springer
UCON is a highly flexible and expressive usage control model which allows an object owner
to specify detailed usage control policies to be evaluated on a remote platform. Assurance of …

Improving the trustworthiness of service QoS information in service-based systems

SS Yau, J Huang, Y Yin - … : 7th International Conference, ATC 2010, Xi'an …, 2010 - Springer
Abstract Service-oriented architecture facilitates rapid development and management of
large-scale distributed service-based systems (SBS), where new workflows are composed of …

Behavioral attestation for business processes

M Alam, M Nauman, X Zhang, T Ali… - … Conference on Web …, 2009 - ieeexplore.ieee.org
Service oriented architecture (SOA) is an architectural paradigm that enables dynamic
composition of heterogeneous, independent, multi-vendor business services. A prerequisite …

Network traffic analysis with query driven visualization sc 2005 hpc analytics results

K Stockinger, K Wu, S Campbell, S Lau… - SC'05: Proceedings …, 2005 - ieeexplore.ieee.org
Our analytics task is to identify, characterize, and visualize anomalous subsets of as large of
a collection of network connection data as possible. We use a combination of HPC …

Trustable outsourcing of business processes to cloud computing environments

S Alsouri, S Katzenbeisser… - 2011 5th international …, 2011 - ieeexplore.ieee.org
Cloud Computing, the next generation of Internet-based services, will allow cost-effective
outsourcing of applications and business processes. However, outsourcing business …

Specification and standardization of a java trusted computing api

R Toegl, T Winkler, M Nauman… - Software: Practice and …, 2012 - Wiley Online Library
SUMMARY The paradigm of Trusted Computing promises a new approach to improve the
security of computer systems. The core functionality, based on a hardware component …

Design and implementation of an attestation protocol for measured dynamic behavior

T Ali, R Ismail, S Musa, M Nauman, S Khan - The Journal of …, 2018 - Springer
Security of applications running on remote devices has become an essential need of
enterprises. For this purpose, several software-based solutions have been proposed …

[HTML][HTML] Micro-architecture support for integrity measurement on dynamic instruction trace

H Lin, G Lee - Journal of Information Security, 2010 - scirp.org
Trusted computing allows attesting remote system's trustworthiness based on the software
stack whose integrity has been measured. However, attacker can corrupt system as well as …