38 resources related to Capability-based Security
- Topics related to Capability-based Security
- IEEE Organizations related to Capability-based Security
- Conferences related to Capability-based Security
- Periodicals related to Capability-based Security
- Most published Xplore authors for Capability-based Security
No organizations are currently tagged "Capability-based Security"
2021 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE)
FUZZ-IEEE 2021 will represent a unique meeting point for scientists and engineers, both from academia and industry, to interact and discuss the latest enhancements and innovations in the field. The topics of the conference will cover all the aspects of theory and applications of fuzzy sets, fuzzy logic and associated approaches (e.g. aggregation operators such as the Fuzzy Integral), as well as their hybridizations with other artificial and computational intelligence techniques.
2020 IEEE International Symposium on Information Theory (ISIT)
Information theory, coding theory, communication theory, signal processing, and foundations of machine learning
IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.
AI interaction with DB technologyBig Data, Data-Warehousing System ArchitecturesBenchmarking, Performance Modelling, and TuningCrowdsourcingCloud Computing and Database-as-a-ServiceDatabase Privacy, Security, and TrustData ScienceData Integration, Metadata Management, and InteroperabilityData Models, Semantics, Query languagesData Mining and Knowledge DiscoveryData Provenance, Workflows, Scientific Data ManagementData Stream Systems and Sensor NetworksData Visualization and Interactive Data ExplorationDistributed, Parallel and P2P Data ManagementHigh Performance Transaction ManagementInformation Extraction, Data Cleaning CurationModern Hardware and In-Memory Database SystemsQuery Processing, Indexing, and OptimizationScalable Analytics, Graph, RDF, Web Data and Social NetworksStrings, Texts, and Keyword SearchTemporal, Spatial, Mobile and Multimedia DataUncertain, Probabilistic and Approximate Databases
The IEEE LCN conference is the premier conference on the leading edge of theoretical and practical aspects of computer networking. LCN is a highly interactive conference that enables an effective interchange of results and ideas among researchers, users, and product developers. For the past 43 years, major developments from high-speed networks to the global Internet to specialized sensor networks have been reported at thisconference.
No periodicals are currently tagged "Capability-based Security"
IEEE/ACM Transactions on Networking, 2017
Named data networking (NDN) enhances traditional IP networking by supporting in-network content caching for better bandwidth usage and location-independent data accesses for multi-path forwarding. However, NDN also brings new security challenges. For example, an adversary can arbitrarily inject packets to NDN to poison content cache, or access content packets without any restrictions. We propose capability-based security enforcement architecture (CSEA), a ...
Abstraction and Modeling of Cyber Security tutorial, Part 2
Ricardo Neisse: Security Certification and Labeling in the Internet of Things: WF-IoT 2016
Big Data & the Cloud: Privacy and Security issues
Digital Neuromorphic Design of a Liquid State Machine for Real-Time Processing - Nicholas Soures: 2016 International Conference on Rebooting Computing
Network Resource Allocation: Technical Session 3 - HPSR 2020 Virtual Conference
Historical Impact of Government Investment in High Performance Computing - Robert Leland: 2016 International Conference on Rebooting Computing
FinSAL: A Novel FinFET Based Secure Adiabatic Logic for Energy-Efficient and DPA Resistant IoT Devices - Himanshu Thapliyal: 2016 International Conference on Rebooting Computing
JUSTIN M. SHAW - IEEE Magnetics Distinguished Lecture
Optical Stealth Communication based on Amplified Spontaneous Emission Noise - Ben Wu - IEEE Sarnoff Symposium, 2019
John S. Baras accepts the IEEE Simon Ramo Medal - Honors Ceremony 2017
George Oikonomou’s Paper: Traffic Forensics for IPv6-Based Wireless Sensor Networks and the IoT: WF-IoT 2016
IEEE Medal for Environmental and Safety Technologies - Jerome Faist and Frank K. Tittell - 2018 IEEE Honors Ceremony
Protecting Internet Traffic: Security Challenges and Solutions – IEEE Internet Initiative Webinar
Resonant Power Supply: NXP
Rebooting Computing: SRC Related Efforts - Steven Hillenius: 2016 International Conference on Rebooting Computing
Alexandros Fragkiadakis: Trust-based Scheme Employing Evidence Reasoning for IoT Architectures: WF-IoT 2016
Community Based Career Development Panel: IEEE WIE Forum USA East 2017
NIKSUN World Wide Security & Mobility Conference 2011-Rajagopalan
IEEE HardTech Summit 2016: Challenges in Power Engineering
Named data networking (NDN) enhances traditional IP networking by supporting in-network content caching for better bandwidth usage and location-independent data accesses for multi-path forwarding. However, NDN also brings new security challenges. For example, an adversary can arbitrarily inject packets to NDN to poison content cache, or access content packets without any restrictions. We propose capability-based security enforcement architecture (CSEA), a capability-based security enforcement architecture that enables data authenticity in NDN in a distributed manner. CSEA leverages capabilities to specify the access rights of forwarded packets. It allows NDN routers to verify the authenticity of forwarded packets, and throttles flooding-based DoS attacks from unsolicited packets. We further develop a lightweight one-time signature scheme for CSEA to ensure the timeliness of packets and support efficient verification. We prototype CSEA on the open-source CCNx platform, and evaluate CSEA via testbed and Planetlab experiments. Our experimental results show that CSEA only incurs around 4% of additional delays in retrieving data packets.
No standards are currently tagged "Capability-based Security"