Secure Personal Content Networking Over Untrusted Devices
نویسندگان
چکیده
منابع مشابه
Secure Personal Content Networking Over Untrusted Devices
Securely sharing and managing personal content is a challenging task in multidevice environments. In this paper, we design and implement a new platform called personal content networking (PCN). Our work is inspired by content-centric networking (CCN) becausewe aim to enable access to personal content using its name instead of its location. The unique challenge of PCN is to support secure file o...
متن کاملSecure Data Replication over Untrusted Hosts
Data replication is a widely used technique for achieving fault tolerance and improved performance. With the advent of content delivery networks, it is becoming more and more frequent that data content is placed on hosts that are not directly controlled by the content owner, and because of this, security mechanisms to protect data integrity are necessary. In this paper we present a system archi...
متن کاملSecure Image Retrieval over Untrusted Cloud Servers
140 Abstract-Security issue represents the main barrier facing the wide adoption of cloud computing. Encryption is the best method to mitigate users' concerns. However, this method makes searching the encrypted data a challenging task. Accordingly, several approaches have been proposed to enable searching the encrypted, remotely stored data without decryption. Till now, almost all these approac...
متن کاملLeveraging personal devices for stronger password authentication from untrusted computers
Internet authentication for popular end-user transactions, such as online banking and e-commerce, continuesto be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer(typically untrusted) PCs over smaller personal devices for actual transactions, due to usability features related tokeyboard and screen size. However most such transact...
متن کاملSecure Personal Information Management for Mobile Devices
More than six decades after Vannevar Bush put forward Memex [3], his vision of a personal information management (PIM) framework, most computer users are still constrained by a rigid hierarchical file organization, where the semantic relationships among data are not emphasized. The semantic desktop leverages the potential of the semantic web to address the challenges of complex PI spaces, which...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Wireless Personal Communications
سال: 2014
ISSN: 0929-6212,1572-834X
DOI: 10.1007/s11277-014-2093-4