Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Tsvetoslava Vateva-Gurova"'
Autor:
Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Christian Schlehuber, Neeraj Suri
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319662657
SAFECOMP
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Safety, Reliability, and Security
Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017
SAFECOMP
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Safety, Reliability, and Security
Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017
We present the proposed security architecture Deutsche Bahn plans to deploy to protect its trackside safety-critical signalling system against cyber-attacks. We first present the existing reference interlocking system that is built using standard com
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f5fa32c220f3e0894d9fce23806f1d38
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030120849
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
Critical Infrastructures (CIs) increasingly leverage Cloud computing given its benefits of on-demand scalability, high availability and cost efficiency. However, the Cloud is typically characterized by the co-location of users from varied security do
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5e9a9972808fb108d67ac13ece865255
https://doi.org/10.1007/978-3-030-12085-6_3
https://doi.org/10.1007/978-3-030-12085-6_3
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030120849
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
Critical Infrastructures (CIs) such as e-commerce, energy, transportation, defense, monitoring etc., form the basis of the modern ICT society, and these CI’s increasingly utilize ICT services such as the Cloud to provide for scalable, robust and co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::053a564d1c4234ab33603d3de868630c
https://doi.org/10.1007/978-3-030-12085-6_6
https://doi.org/10.1007/978-3-030-12085-6_6
Autor:
Neeraj Suri, Tsvetoslava Vateva-Gurova
Publikováno v:
PRDC
Threats posed by side-channel and covert-channel attacks exploiting the CPU cache to compromise the confidentiality of a system raise serious security concerns. This applies especially to systems offering shared hardware or resources to their custome
Publikováno v:
International Journal of Critical Infrastructure Protection
Rapid elasticity, ubiquitous network access, and highly-reliable services are some of the desirable features of cloud computing that are attractive for building cloud-assisted data-intensive Smart Grid (SG) applications. However, the Distributed Deni
Publikováno v:
CIT/IUCC/DASC/PICom
A virtualized environment (VE) is expected to provide secure logical isolation across the co-located tenants encapsulated in the virtual machines. In particular the VE should prevent covert-channels exploitation stemming from the usage of shared reso
Publikováno v:
E-Business and Telecommunications ISBN: 9783319259147
ICETE (Selected Papers)
ICETE (Selected Papers)
The isolation among physically co-located virtual machines is an important prerequisite for ensuring the security in a virtualized environment (VE). The VE should prevent from exploitation of side-channels stemming from the usage of shared resources,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::add9bc83a203ae66a7edfce4db939dcc
https://doi.org/10.1007/978-3-319-25915-4_17
https://doi.org/10.1007/978-3-319-25915-4_17
Autor:
Tsvetoslava Vateva-Gurova, Ahmad Sabouri, Michael Østergaard Pedersen, Fatbardh Veseli, Gert Læssøe Mikkelsen
Publikováno v:
Attribute-based Credentials for Trust ISBN: 9783319144382
Attribute-based Credentials for Trust
Attribute-based Credentials for Trust
In this chapter we compare Privacy-ABC schemes based on the security, functionality and efficiency they offer. The aim of this is to help researchers and application developers choose an schemes and parameters most suitable for their application.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b2f834abadc1fc467d0365e2ea2426d
https://doi.org/10.1007/978-3-319-14439-9_4
https://doi.org/10.1007/978-3-319-14439-9_4
Autor:
Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Alessandra De Benedictis
Publikováno v:
Communications in Computer and Information Science ISBN: 9783319115603
CLOSER (Selected Papers)
CLOSER (Selected Papers)
As the popularity of Cloud computing has grown during the last years, the choice of Cloud Service Provider (CSP) has become an important issue from user’s perspective. Although the Cloud users are more and more concerned about their security in the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::02a54d4bbfbe7f74395d4e12aecf2814
https://doi.org/10.1007/978-3-319-11561-0_1
https://doi.org/10.1007/978-3-319-11561-0_1
Publikováno v:
ICT Systems Security and Privacy Protection ISBN: 9783642554148
SEC
SEC
Technologies based on attribute-based credentials (Privacy-ABC) enable identity management systems that require minimal disclosure of personal information and provide unlinkability of user’s transactions. However, underlying characteristics of and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3bd1c90be7372cc195027ff1849014f9
https://doi.org/10.1007/978-3-642-55415-5_16
https://doi.org/10.1007/978-3-642-55415-5_16