Auflistung nach Autor:in "Jaatun, Martin Gilje"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragDrizzle: the RAIN prototype(12th International Conference on Innovative Internet Community Services (I2CS 2012), 2012) Jaatun, Martin Gilje; Askeland, Christian Emil; Salvesen, Anders EmilInternet communities are moving to the Cloud, but in addition to the advantages regarding cost and convenience, this also means that cloud service providers are increasingly in a position to aggregate large amounts of personal data, which means that it is becoming prudent to develop mechanisms that can contribute to limiting the information available to providers. In this paper we present a prototype cloud security solution for protection against an “honest but curious” cloud provider. The solution is based on splitting up data and distributing it to multiple cloud providers, without encrypting the individual pieces. Our initial tests indicate that our solution is sufficiently efficient for normal use.
- KonferenzbeitragOn the adoption of usage control technology in collaborative environments(12th International Conference on Innovative Internet Community Services (I2CS 2012), 2012) Ahlmann Nyre, Åsmund; Jaatun, Martin GiljeThe extensive collaboration across system boundaries facilitated by the Internet is unfortunately also increasing the potential for misuse of shared information. While mechanisms to protect assets from active attackers (such as firewalls, intrusion detection systems and anti-virus software) are commonplace, the availability of commercial software to protect information from misuse remains limited. Businesses employ non-disclosure agreements, but have no means to prevent or detect violations of these. Usage control has been proposed as the means to protect information even after its distribution. However, despite the efforts to develop new usage control technology and the apparent need for it, the industry is less enthusiastic. In this paper we investigate existing theories of technology adoption in order to better understand the industryperspective and to improve technology development. We base our study well-known general theories on protection motivation, innovation diffusion and technology acceptance. We then utilize these theories and preliminary results of a case study to build a new model for understanding usage control technology acceptance.