Zobrazeno 1 - 10
of 85
pro vyhledávání: '"Ray Hunt"'
Publikováno v:
ACM Computing Surveys. 45:1-39
Although system virtualization is not a new paradigm, the way in which it is used in modern system architectures provides a powerful platform for system building, the advantages of which have only been realized in recent years, as a result of the rap
Publikováno v:
Information Management & Computer Security. 18:124-139
PurposeThe purpose of this paper is to address some weaknesses in the handling of current multi‐factor authentication, suggests some criteria for overcoming these weaknesses and presents a simple proof of concept authentication system.Design/method
Autor:
Ray Hunt, Sascha Rehbock
Publikováno v:
Computer Communications. 32:1006-1013
In Trusted Network Connect (TNC), a network access decision is based on the security state of an access requesting party. This mechanism is limited to closed environments such as LANs and VPNs. In this paper, we propose solutions based on authenticat
Publikováno v:
TrustCom/BigDataSE/ISPA (1)
Cloud services are now used by many organizations for the computation and storage of both public and sensitive data. Organizations expect that the data stored on clouds will be reasonably protected in terms of confidentiality, integrity and availabil
Publikováno v:
Journal of forensic sciences. 61(6)
Mobile devices have become ubiquitous in almost every sector of both private and commercial endeavors. As a result of such widespread use in everyday life, many users knowingly and unknowingly save significant amounts of personal and/or commercial da
Autor:
Ray Hunt, James Carpinter
Publikováno v:
Computers & Security. 25:566-578
This paper provides an overview of current and potential future spam filtering approaches. We examine the problems spam introduces, what spam is and how we can measure it. The paper primarily focuses on automated, non-interactive filters, with a broa
Autor:
Kyeong Yoo, Ray Hunt
Publikováno v:
Computer Communications. 29:3079-3091
Multicasting architecture is essential for the delivery of a variety of multimedia applications. IPv6 provides a very comprehensive range of protocols to deal with this delivery mechanism. However few, if any, implementations exist for this architect
Autor:
Ray Hunt, Simon Luke Hansman
Publikováno v:
Computers & Security. 24:31-43
Attacks over the years have become both increasingly numerous and sophisticated. This paper focuses on the provisioning of a method for the analysis and categorisation of both computer and network attacks, thus providing assistance in combating new a
Autor:
Nilufar Baghaei, Ray Hunt
Publikováno v:
Computer Communications. 27:1746-1756
Existing solutions for wireless LAN networks have been subject to security vulnerabilities and previous study has addressed and evaluated the security performance of IEEE 802.11b wireless networks using single server-client architecture and simple tr