Design Guidelines on Trust Management for Underwater Wireless Sensor Networks

R Zhu, A Boukerche, L Long… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
In recent years, significant advancements in wireless underwater communication and
acoustic sensor technology have spurred the exploration and utilization of the ocean's vast …

Recent trends in applying TPM to cloud computing

S Hosseinzadeh, B Sequeiros, PRM Inácio… - Security and …, 2020 - Wiley Online Library
Trusted platform modules (TPM) have become important safe‐guards against variety of
software‐based attacks. By providing a limited set of cryptographic services through a well …

[PDF][PDF] ProvTalk: Towards Interpretable Multi-level Provenance Analysis in Networking Functions Virtualization (NFV).

A Tabiban, H Zhao, Y Jarraya, M Pourzandi, M Zhang… - NDSS, 2022 - researchgate.net
Network functions virtualization (NFV) enables agile deployment of network services on top
of clouds. However, as NFV involves multiple levels of abstraction representing the same …

The Open Cloud Testbed (OCT): A platform for research into new cloud technologies

M Zink, D Irwin, E Cecchet… - 2021 IEEE 10th …, 2021 - ieeexplore.ieee.org
The NSF-funded Open Cloud Testbed (OCT) project is building and supporting a testbed for
research and experimentation into new cloud platforms–the underlying software which …

[HTML][HTML] A novel architecture to virtualise a hardware-bound trusted platform module

M De Benedictis, L Jacquin, I Pedone, A Atzeni… - Future Generation …, 2024 - Elsevier
Security and trust are particularly relevant in modern softwarised infrastructures, such as
cloud environments, as applications are deployed on platforms owned by third parties, are …

Mitigating software integrity attacks with trusted computing in a time distribution network

DG Berbecaru, S Sisinni, A Lioy, B Rat… - IEEE …, 2023 - ieeexplore.ieee.org
Time Distribution Networks (TDNs) evolve as new technologies occur to ensure more
accurate, reliable, and secure timing information. These networks typically exploit several …

Counteracting software integrity attacks on IoT devices with remote attestation: a prototype

DG Berbecaru, S Sisinni - 2022 26th International Conference …, 2022 - ieeexplore.ieee.org
Internet of Things (IoT) devices are increasingly deployed nowadays in various security-
sensitive contexts, eg, inside homes or in critical infrastructures. The data they collect is of …

Supporting security sensitive tenants in a {bare-metal} cloud

A Mosayyebzadeh, A Mohan, S Tikale, M Abdi… - 2019 USENIX Annual …, 2019 - usenix.org
SecCloud is a new architecture for bare-metal clouds that enables tenants to control
tradeoffs between security, price, and performance. It enables security-sensitive tenants to …

ProSAS: Proactive Security Auditing System for Clouds

S Majumdar, GS Chawla… - … on Dependable and …, 2021 - ieeexplore.ieee.org
The multi-tenancy in a cloud along with its dynamic and self-service nature could cause
severe security concerns, such as isolation breaches among cloud tenants. To mitigate such …

Defining intercloud security framework and architecture components for multi-cloud data intensive applications

Y Demchenko, F Turkmen, M Slawik… - 2017 17th IEEE/ACM …, 2017 - ieeexplore.ieee.org
This paper presents results of the ongoing development of the Intercloud Security
Framework (ICSF), that is a part of the Intercloud Architecture Framework (ICAF), and …