• Publications
  • Influence
Security for Network Attached Storage Devices
Abstract : This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at aExpand
  • 59
  • 5
  • PDF
Human factors in web authentication
This dissertation endeavors to improve the security of user authentication on the World Wide Web. One threat to Web authentication is phishing, a social engineering attack that solicits users'Expand
  • 9
  • 2
  • PDF
Security for a high performance commodity storage subsystem
How do we incorporate security into a high performance commodity storage subsystem? Technology trends and the increasing importance of I/O bound workloads are driving the development of commodityExpand
  • 38
  • 1
  • PDF
Security for Network Attached Storage Devices (CMU-CS-97-185)
This paper presents a novel cryptographic capability system addressing the security and performance needs of network attached storage systems in which file management functions occur at a differentExpand
  • 16
  • 1
  • PDF
Information Systems Security
Space-based systems play an important role in our daily life and business. The trend is likely to rely on the use of space based systems in a growing number of services or applications that can beExpand
  • 7
  • 1
Confidentiality-Preserving Query Execution of Fragmented Outsourced Data
Ensuring confidentiality of outsourced data continues to be an area of active research in the field of privacy protection. Almost all existing privacy-preserving approaches to address this problemExpand
  • 2
  • 1
Advances in Software Engineering Techniques
  • 9
Algorithms and Models for the Web Graph
The burning number b(G) of a graph G was introduced by Bonato, Janssen, and Roshanbin [Lecture Notes in Computer Science 8882 (2014)] to measure the speed of the spread of contagion in a graph. TheyExpand
  • 17
  • PDF
Compromising PCA-based Anomaly Detectors for Network-Wide Traffic
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercialExpand
  • 22
  • PDF
Proceedings of the 2nd ACM conference on Electronic commerce
  • 14