Share This Author
Xen and the art of virtualization
Xen, an x86 virtual machine monitor which allows multiple commodity operating systems to share conventional hardware in a safe and resource managed fashion, but without sacrificing either performance or functionality, considerably outperform competing commercial and freely available solutions.
Pinocchio: Incentives for Honest Participation in Distributed Trust Management
- Alberto Fernandes, E. Kotsovinos, Sven A. M. Östring, Boris Dragovic
- Computer ScienceiTrust
- 29 March 2004
A framework for providing incentives for honest participation in global-scale distributed trust management infrastructures is introduced and an honesty metric is developed which can indicate the accuracy of feedback.
Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices
- Iulia Ion, Boris Dragovic, B. Crispo
- Computer ScienceTwenty-Third Annual Computer Security…
- 10 December 2007
This paper proposes an extension to the security architecture of the java virtual machine for mobile systems, to support fine-grained policy specification and run-time enforcement, with excellent performance provided by the extended architecture.
XenoTrust: event-based distributed trust management
- Boris Dragovic, E. Kotsovinos, S. Hand, P. Pietzuch
- Computer Science14th International Workshop on Database and…
- 1 September 2003
XenoTrust is described, the trust management architecture used in the XenoServer Open Platform, and it is suggested that using an event-based publish /subscribe methodology for the storage, retrieval and aggregation of reputation information can help exploiting asynchrony and simplicity, as well as improving scalability.
Audio Location: Accurate Low-Cost Location Sensing
The various design parameters for audio location systems, the applicability of audio location for novel 3D user interfaces based on human sounds, and a quantitative evaluation of a working prototype are described.
Information exposure control through data manipulation for ubiquitous computing
This paper presents the initial work on a novel paradigm for information security and privacy protection in the ubiquitous world through sets of contextual attributes and mitigate the projected risks through proactive and reactive data format transformations, subsetting and forced migrations while trying to maximize information availability.
Containment: From context awareness to contextual effects awareness
This work presents an approach to modeling the world based on natural notions of container and containment and shows how it enables explicit reasoning about and acting upon context-implied effects on target entities, data objects in particular.
CASPEr: containment-aware security for pervasive computing environments
- Boris Dragovic
This thesis would have never arrived at this point in the PhD path without generous financial support from St John's College Benefactors' Scholarship, Overseas Research Scholarship, Cambridge Overseas Trust and Cambridge Philosophical Society.
Managing Trust and Reputation in the XenoServer Open Platform
XenoTrust provides a flexible platform over which many of the interesting distributed trust management algorithms presented in the literature can be evaluated in a large-scale wide-area setting.
Don’t trust POS terminals! Verify in-shop payments with your phone
The EMV payment protocol is extended to provide explicit verification and confirmation of the transaction amount, and cardholder authentication is improved, to protect against stolen PIN and cards, and eliminate the POS terminal from the trust chain altogether.