CS Store Search
Displaying 1-4 out of 4 total
Cloud Data Protection for the Masses
By Dawn Song,Elaine Shi,Ian Fischer,Umesh Shankar
Issue Date:January 2012
Offering strong data protection to cloud users while enabling rich applications is a challenging task. Researchers explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development eff...
Active Mapping: Resisting NIDS Evasion without Altering Traffic
Security and Privacy, IEEE Symposium on
By Umesh Shankar, Vern Paxson
Issue Date:May 2003
A critical problem faced by a Network Intrusion Detection System (NIDS) is that of ambiguity.TheNIDS cannot always determine what traffic reaches a given host nor how that host will interpret the traffic, and attackers may exploit this ambiguity to avoid d...
Doppelganger: Better browser privacy without the bother
Found in: Proceedings of the 13th ACM conference on Computer and communications security (CCS '06)
By Chris Karlof, Umesh Shankar
Issue Date:October 2006
We introduce Doppelganger, a novel system for creating and enforcing fine-grained, privacy preserving browser cookie policies with low manual effort. Browser cookies pose privacy risks, since they can be used to track users' actions in detail, but some coo...
PRIMA: policy-reduced integrity measurement architecture
Found in: Proceedings of the eleventh ACM symposium on Access control models and technologies (SACMAT '06)
By Reiner Sailer, Trent Jaeger, Umesh Shankar
Issue Date:June 2006
We propose an integrity measurement approach based on information flow integrity,which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA).The recent availability of secure hardware has made it practical for a system to measure its own in...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.