The large-scale, dynamic, and heterogeneous nature of cloud computing poses numerous security challenges. But the cloud’s main challenge is to provide a robust authorization mechanism that incorporates multitenancy and virtualization aspects of resources. The authors present a distributed architecture that incorporates principles from security management and software engineering and propose key requirements and a design […]
Leveraging a Compound Graph-Based DHT for Multi-Attribute Range Queries with Performance Analysis
Resource discovery is critical to the usability and accessibility of grid computing systems. Distributed Hash Table (DHT) has been applied to grid systems as a distributed mechanism for providing scalable range-query and multi-attribute resource discovery. Multi-DHT-based approaches depend on multiple DHT networks with each network responsible for a single attribute. Single-DHT-based approaches keep the resource […]
Exploring the design space of social network-based Sybil defenses
Recently, there has been significant research interest in leveraging social networks to defend against Sybil attacks. While much of this work may appear similar at first glance, existing social network-based Sybil defense schemes can be divided into two categories: Sybil detection and Sybil tolerance. These two categories of systems both leverage global properties of the […]
Robust Face-Name Graph Matching for Movie Character Identification
Automatic face identification of characters in movies has drawn significant research interests and led to many interesting applications. It is a challenging problem due to the huge variation in the appearance of each character. Although existing methods demonstrate promising results in clean environment, the performances are limited in complex movie scenes due to the noises […]
Separable Reversible Data Hiding in Encrypted Image
This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some […]
User-Aware Image Tag Refinement via Ternary Semantic Analysis
Large-scale user contributed images with tags are easily available on photo sharing websites. However, the noisy or incomplete correspondence between the images and tags prohibits them from being leveraged for precise image retrieval and effective management. To tackle the problem of tag refinement, we propose a method of Ranking based Multi-correlation Tensor Factorization (RMTF), to […]
Harnessing the Cloud for Securely Outsourcing Large-Scale Systems of Linear Equations
Cloud computing economically enables customers with limited computational resources to outsource large-scale computations to the cloud. However, how to protect customers’ confidential data involved in the computations then becomes a major security concern. In this paper, we present a secure outsourcing mechanism for solving large-scale systems of linear equations (LE) in cloud. Because applying traditional […]
Business-OWL (BOWL)—A Hierarchical Task Network Ontology for Dynamic Business Process Decomposition and Formulation
Collaborative Business Processes (cBPs) form the backbone of enterprise integration. With the growing reliance on the web as a medium of business collaboration, there is an increasing need to quickly and dynamically form cBPs. However, current Business-to-Business (B2B) information systems are still static in nature, and are unable to dynamically form cBPs based on high-level […]
IntentSearch: Capturing User Intention for One-Click Internet Image Search
Web-scale image search engines (e.g., Google image search, Bing image search) mostly rely on surrounding text features. It is difficult for them to interpret users’ search intention only by query keywords and this leads to ambiguous and noisy search results which are far from satisfactory. It is important to use visual information in order to […]
Detecting and Resolving Firewall Policy Anomalies
The advent of emerging computing technologies such as service-oriented architecture and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services. Firewalls are the most widely deployed security mechanism to ensure the security of private networks in most […]
- « Previous Page
- 1
- …
- 69
- 70
- 71
- 72
- 73
- …
- 108
- Next Page »