Learn More
—With the recent adoption and diffusion of the data sharing paradigm in distributed systems such as online social networks or cloud computing, there have been increasing demands and concerns for distributed data security. One of the most challenging issues in data sharing systems is the enforcement of access policies and the support of policies updates.(More)
—IEEE 802.16e uses EAP-based authentication and key management for link layer security. Due to the lack of ability to support mobility, however, EAP-based key management becomes a principal impediment to the achievement of an efficient and secure handover in IEEE 802.16e mobile WiMAX networks. In this paper, an overview of the EAP-based handover procedures(More)
Achieving both security and efficiency is the challenging issue for a data outsourcing service in the cloud computing. Proof of Storage with Deduplication (POSD) [1] is the first solution that addresses the issue for the cloud storage. However, the validity of the POSD scheme stands on the strong assumption that all clients are honest in terms of generating(More)