2 resultados para 802.11 security protocols

em WestminsterResearch - UK


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The infrastructure cloud (IaaS) service model offers improved resource flexibility and availability, where tenants - insulated from the minutiae of hardware maintenance - rent computing resources to deploy and operate complex systems. Large-scale services running on IaaS platforms demonstrate the viability of this model; nevertheless, many organizations operating on sensitive data avoid migrating operations to IaaS platforms due to security concerns. In this paper, we describe a framework for data and operation security in IaaS, consisting of protocols for a trusted launch of virtual machines and domain-based storage protection. We continue with an extensive theoretical analysis with proofs about protocol resistance against attacks in the defined threat model. The protocols allow trust to be established by remotely attesting host platform configuration prior to launching guest virtual machines and ensure confidentiality of data in remote storage, with encryption keys maintained outside of the IaaS domain. Presented experimental results demonstrate the validity and efficiency of the proposed protocols. The framework prototype was implemented on a test bed operating a public electronic health record system, showing that the proposed protocols can be integrated into existing cloud environments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article challenges those perspectives which assert first, that the Security Council’s engagement with the Responsibility to Protect (R2P) during the Arab Spring evidences a generally positive trend, and second, that the response to the Arab Spring, particularly Syria, highlights the need for veto restraint. With respect to the first point, the evidence presented in this article suggests that the manner in which R2P has been employed by the Security Council during this period evidences three key trends: first, a willingness to invoke R2P only in the context of Pillar I; second, a pronounced lack of consensus surrounding Pillar III; and third, the persistent prioritisation of national interests over humanitarian concerns. With respect to veto restraint, this article argues that there is no evidence that this idea will have any significant impact on decision-making at the Security Council; the Council’s response to the Arab Spring suggests that national interests continue to trump humanitarian need.