Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMarch 2024
Learn to Unlearn: Insights Into Machine Unlearning
This article presents a comprehensive review of recent machine unlearning techniques, verification mechanisms, and potential attacks. We highlight emerging challenges and prospective research directions, aiming to provide valuable resources for ...
- research-articleJanuary 2024
Self-Encrypting Drive Evolving Toward Multitenant Cloud Computing
In a multitenant cloud computing environment, user data resides in remote servers where multiple users share hardware and software components. Therefore, it is crucial to protect data against unauthorized parties within the cloud system. The self-...
- research-articleJanuary 2024
Soft Biometrics for Cybersecurity: Ongoing Revolution for Industry 4.0
The industrial sector faces significant cyberthreats due to the vast data exchange in Industry 4.0. Soft biometrics offer a suitable tradeoff by enhancing security through additional layers of recognition, mitigating privacy concerns through the ...
- research-articleNovember 2022
Trends in User Identity and Continuous Authentication
- Uélison Jean Lopes dos Santos,
- Cristiano André da Costa,
- André Henrique Mayer,
- Eduardo Souza dos Reis,
- Juan Eduardo Cruz Maldonado,
- Jorge Luis Victória Barbosa,
- Rodolfo Stoffel Antunes,
- Rodrigo da Rosa Righi,
- Nelson Eduardo Flores
The challenges of continuous authentication have resulted in a surge of recent studies. This article surveys the state of the art and rising trends in continuous and adaptive context-aware authentication. It employs a statistical approach to collect ...
- research-articleAugust 2022
A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems
Although the use of personal data from different contexts is essential to curbing the spread of COVID-19 in epidemic-handling systems (EHSs), it increases the chances of privacy breaches and personal data misuse. This article analyses the data lifecycle ...
-
- opinionJanuary 2022
Cryptojacking
The cybersecurity community never ceases to amaze or disappoint; it continually adds words to the English dictionary. Here’s another: “cryptojacking.” It’s not carjacking or hijacking, but similar. It is a word that you might wish to know more about.
- research-articleNovember 2021
Zero Trust: The What, How, Why, and When
Trust is a critical characteristic of computer systems, but the traditional approach of evaluating systems has failed to deliver the required levels of confidence. We review the emerging zero trust paradigm and propose a new set of zero trust tenets and ...
- research-articleNovember 2021
A Comparative Study of Design Paradigms for PUF-Based Security Protocols for IoT Devices: Current Progress, Challenges, and Future Expectation
Device authentication is an essential security feature for the Internet of Things (IoT). Physical unclonable functions (PUFs) are a promising technology for developing lightweight authentication protocols in these environments. This article presents the ...
- discussionSeptember 2021
- research-articleFebruary 2021
A Secure and Flexible FPGA-Based Blockchain System for the IIoT
Blockchain is a promising solution for Industry 4.0; however, it does not guarantee input data integrity. We propose a field-programmable gate array (FPGA)-based private blockchain system for the industrial Internet of Things, where the transaction ...
- discussionAugust 2020
Putting the Passe Into Passwords: How Passwordless Technologies Are Reshaping Digital Identity
Despite significant flaws, passwords persist as the predominant method to authenticate digital identity. Looks at alternatives to password authentication and explores where password use is headed in the future to ensure privacy and security.
- research-articleJuly 2020
Blockchain Architecture for Auditing Automation and Trust Building in Public Markets
Business transactions by public firms must be reported, verified, and audited periodically, which is labor intensive and time consuming. To streamline this procedure, we have designed Future Auditing Blockchain to automate the reporting and auditing ...
- research-articleJuly 2020
Blockchain for E-Health-Care Systems: Easier Said Than Done
Blockchain as a distributed ledger technology can be very effective in providing access control and big data management in health-care systems. Because implementing or migrating to a pure blockchain solution is an extremely challenging task, several ...
- research-articleJanuary 2017
“Alexa, Can I Trust You?”
Several recent incidents highlight significant security and privacy risks associated with intelligent virtual assistants (IVAs). Better diagnostic testing of IVA ecosystems can reveal such vulnerabilities and lead to more trustworthy systems.
- research-articleJanuary 2017
Blockchain Technology: Transforming Libertarian Cryptocurrency Dreams to Finance and Banking Realities
The financial technology (FinTech) sector sees high potential value in cryptocurrency blockchain protocols, or distributed-ledger technology (DLT). However, the requirements and guarantees of blockchains for cryptocurrencies do not match those of FinTech&#...
- research-articleJanuary 2017
Topology-Aware Access Control of Smart Spaces
- Liliana Pasquale,
- Carlo Ghezzi,
- Edoardo Pasi,
- Christos Tsigkanos,
- Menouer Boubekeur,
- Blanca Florentino-Liano,
- Tarik Hadzic,
- Bashar Nuseibeh
Smart spaces are becoming increasingly vulnerable from the interplay of cyber and physical entities. A representation of the spaces' topology can reveal security-relevant contextual characteristics, and a visualization tool allows security analysts to ...
- research-articleDecember 2016
Access Control Policy Verification
To ensure that an access control (AC) system is safe, there must be a reliable means to verify that the specified AC policy model conforms to the safety requirements and policy author's intentions. A general verification approach includes black-box and ...
- research-articleJuly 2016
"Good Enough" Security: The Best We'll Ever Have
Given that no system is completely immune from attack, cybersecurity advances, while important, should take a backseat to improving human awareness of security risks. An objective, consensus-based rating system is one means to achieve this end.
- research-articleJanuary 2016
The Future of Standardization: Are We Destined to Repeat History?
The recent proliferation of information and communications technology standards and their accompanying ad hoc standards bodies could lead to a decentralization of standardization, which will affect privacy and security in the Internet of Things.
- research-articleNovember 2015
Expanding Continuous Authentication with Mobile Devices
More sophisticated methods of detecting user interaction with computers and smartphones are needed for better security and usability. Multimodal continuous authentication is one of the more promising authentication methods on the horizon.