Mostrando 4 resultados de: 4
Publisher
ACM Transactions on Sensor Networks(1)
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016(1)
Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017(1)
Proceedings - 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering, TrustCom/BigDataSE 2019(1)
Área temáticas
Ciencias de la computación(3)
Funcionamiento de bibliotecas y archivos(2)
Biblioteconomía y Documentación informatica(1)
Dirección general(1)
Programación informática, programas, datos, seguridad(1)
Bring your own disclosure: Analysing BYOD threats to corporate information
Conference ObjectAbstract: Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisatPalabras claves:Attack, BYOD, contamination, Disclosure, Forensics, Insider, Outsider, STRIDE, Threat modelAutores:Denys A. Flores, Jhumka A., Qazi F.Fuentes:googlescopusHybrid logical clocks for database forensics: Filling the gap between chain of custody and database auditing
Conference ObjectAbstract: Database audit records are important for investigating suspicious actions against transactional dataPalabras claves:causality, Chain of custody, Database audit, Database forensics, Database security, Hybrid logical clocks, Provenance, Role segregationAutores:Denys A. Flores, Jhumka A.Fuentes:googlescopusImplementing chain of custody requirements in database audit records for forensic purposes
Conference ObjectAbstract: During forensic database investigations, audit records become a crucial evidential element; particulPalabras claves:Admissibility, Architecture, Audit, causality, Chain of custody, Database forensics, Proactive, Provenance, Role segregation, Stored procedure, Timeline, Trigger, Vector clockAutores:Denys A. Flores, Jhumka A.Fuentes:googlescopusThreat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things
ArticleAbstract: There is an increasing demand for Internet of Things (IoT) networks consisting of resource-constrainPalabras claves:computation offloading, Edge computing, internet of things, resource constrained, threat modelling, trustAutores:Bradbury M., Burton J., Butler M., Denys A. Flores, Jhumka A., Watson T.Fuentes:googlescopus