Security and privacy in cloud computing

Z Xiao, Y Xiao - IEEE communications surveys & tutorials, 2012 - ieeexplore.ieee.org
Recent advances have given rise to the popularity and success of cloud computing.
However, when outsourcing the data and business application to a third party causes the …

Byzantine fault-tolerant state-machine replication from a systems perspective

T Distler - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Byzantine fault-tolerant (BFT) state-machine replication makes it possible to design systems
that are resilient against arbitrary faults, a requirement considered crucial for an increasing …

Chainspace: A sharded smart contracts platform

M Al-Bassam, A Sonnino, S Bano, D Hrycyszyn… - arXiv preprint arXiv …, 2017 - arxiv.org
Chainspace is a decentralized infrastructure, known as a distributed ledger, that supports
user defined smart contracts and executes user-supplied transactions on their objects. The …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

[HTML][HTML] A survey of emerging threats in cybersecurity

J Jang-Jaccard, S Nepal - Journal of computer and system sciences, 2014 - Elsevier
The exponential growth of the Internet interconnections has led to a significant growth of
cyber attack incidents often with disastrous and grievous consequences. Malware is the …

Coinshuffle: Practical decentralized coin mixing for bitcoin

T Ruffing, P Moreno-Sanchez, A Kate - … 7-11, 2014. Proceedings, Part II …, 2014 - Springer
The decentralized currency network Bitcoin is emerging as a potential new way of
performing financial transactions across the globe. Its use of pseudonyms towards protecting …

{ROTE}: Rollback protection for trusted execution

S Matetic, M Ahmed, K Kostiainen, A Dhar… - 26th USENIX Security …, 2017 - usenix.org
Security architectures such as Intel SGX need protection against rollback attacks, where the
adversary violates the integrity of a protected application state by replaying old persistently …

A right to a human decision

AZ Huq - Va. L. Rev., 2020 - HeinOnline
Every tectonic technological change-from the first grain domesticated to the first smartphone
set abuzz'-begets a new society. Among the ensuing birth pangs are novel anxieties about …

Exploiting local and global patch rarities for saliency detection

A Borji, L Itti - 2012 IEEE conference on computer vision and …, 2012 - ieeexplore.ieee.org
We introduce a saliency model based on two key ideas. The first one is considering local
and global image patch rarities as two complementary processes. The second one is based …

[PDF][PDF] Vanish: Increasing Data Privacy with Self-Destructing Data.

R Geambasu, T Kohno, AA Levy, HM Levy - USENIX security symposium, 2009 - usenix.org
Today's technical and legal landscape presents formidable challenges to personal data
privacy. First, our increasing reliance on Web services causes personal data to be cached …