RAitc: Securely Auditing the Remotely Executed Applications

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtual Network Connection Technique to Control Device Remotely and Securely

Cloud security has been an important area of research nowadays. The vulnerabilities of cloud system can be easily explored by any attacker and compromise these virtual machines to deploy DDos i.e. Distributed denial of service attack which involves multi step exploitation, compromising virtual machines as zombies, low frequency vulnerability scanning and lastly DDos attack through the zombies. ...

متن کامل

Runtime Verification of Remotely Executed Code using Probabilistically Checkable Proof Systems

In this paper we consider the verification and certification of computations that are done remotely. We investigate the use of probabilistically checkable proof (PCP) systems for efficiently certifying such computations. This model can also be applied to verifying security proofs of software downloads. To make the use of PCPs more practical, a new version of Cook’s Theorem is given for the RAM ...

متن کامل

Ubiquitous Applications Comparative: Applications Executed in Server vs. Applications in Client

Since the ubiquitous computation is born and different mobile devices begin to be able to execute applications, it is necessary deciding on if it is optimal the load and execution of the application on the mobile device or on the contrary, if it would be better the implementation of an application server that the different mobile devices realize to the requests and transactions by web. Certainl...

متن کامل

Remotely Triggered Nano-Theranostics For Cancer Applications

Nanotechnology has enabled the development of smart theranostic platforms that can concurrently diagnose disease, start primary treatment, monitor response, and, if required, initiate secondary treatments. Recent in vivo experiments demonstrate the promise of using theranostics in the clinic. In this paper, we review the use of remotely triggered theranostic nanoparticles for cancer application...

متن کامل

Protecting User Privacy in Remotely Managed Applications

Protecting User Privacy in Remotely Managed Applications

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2020

ISSN: 2169-3536

DOI: 10.1109/access.2020.3021033