Learn More
In this paper we present PasS (Privacy as a Service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud computing architectures. PasS allows for the secure storage and processing of users’ confidential data by leveraging the tamper-proof capabilities of cryptographic coprocessors. Using tamper-proof(More)
We present TRUMMAR, a reputation-based trust model that mobile agent systems can use to protect agents from malicious hosts. TRUMMAR is unique in being a truly comprehensive model since it accounts, in a unified framework for a multitude of concepts such as prior-derived reputation, first impression, loss of reputation information with time, hierarchy of(More)
In this paper, we present a general and comprehensive reputation-based trust model for distributed computing. The proposed model is an enhancement over our previous model, TRUMMAR, and aims at achieving a truly unique model that incorporates most concepts that are essential to determining trust-based decisions. Among the concepts upon which the trust model(More)
Radio Frequency Identification (RFID) is a technology used for automatic identification of objects, people, and virtually anything one can think of. Applications of RFID technology are expanding and its usage has been adopted worldwide. As such, major efforts have been made to secure the communications in RFID systems and to protect them from various(More)
We present an energy-efficient protocol for ensuring the integrity of storage services in mobile cloud computing. The proposed protocol applies the concepts of incremental cryptography and trusted computing to design secure integrity data structures that protect the customer data while highly reducing the mobile client energy consumption and efficiently(More)
In this paper we present a comprehensive study of mobile agent applications. We classify the application fields as follows: Network monitoring and management, information searching and filtering, multimedia, Internet, intrusion detection, telecommunications, military, and others. We discuss the potential uses of mobile agents in the various fields and(More)
Many emerging mobile applications nowadays tend to be computation-intensive due to the increasing popularity and convenience of smartphones. Nevertheless, a major obstacle prohibits the direct adoption of such applications and that is battery lifetime. Mobile Cloud Computing (MCC) is a promising solution that suggests the partial processing of applications(More)
Many obstacles impede the successful deployment of sensor networks. In addition to the limited resources issue, security is a major concern especially for applications such as home security monitoring, military, and battle field applications. In this paper we present a defense mechanism against wormhole attacks in wireless sensor networks. Specifically, a(More)
Vehicular ad hoc network (VANET) is a promising technology for providing safer roads and a more efficient driving experience. However, the deployment of VANETs is dependent on several issues in security and privacy. In this paper, a trust-based privacy-preserving model for VANETs is presented. The model is unique in its ability to protect privacy while(More)