Loading [MathJax]/extensions/MathMenu.js
Lori M. Kaufman - IEEE Xplore Author Profile

Showing 1-5 of 5 results

Filter Results

Show

Results

How Private Is the Internet?

Lori M. Kaufman

IEEE Security & Privacy
Year: 2011 | Volume: 9, Issue: 1 | Magazine Article |
Cited by: Papers (3)
Most common uses of the Internet are email, Web surfing, and transactions ranging from e-commerce to bill paying. This paper discussed on how to prevent eavesdropping and eliminate possible attack modalities. HTTPS allows for the growing work of e-commerce, online banking and bill paying, and other activities requiring secure information exchange.Show More

How Private Is the Internet?

Lori M. Kaufman

Year: 2011 | Volume: 9, Issue: 1 | Magazine Article |
Because cloud-computing environments' security vulnerabilities differ from those of traditional data centers, perimeter-security approaches will no longer work. Security must move from the perimeter to the virtual machines.Show More

Can a Trusted Environment Provide Security?

Lori M. Kaufman

IEEE Security & Privacy
Year: 2010 | Volume: 8, Issue: 1 | Magazine Article |
Internet security is the topic of this paper. Software as a service (SaaS) is a well-established, cost-effective means to deliver traditional software applications without investing in infrastructure and qualified personnel. A natural extension of cloud services is to extend platform independence via virtualization to a security model. This paradigm allows for the distributed provisioning of commo...Show More

Can a Trusted Environment Provide Security?

Lori M. Kaufman

Year: 2010 | Volume: 8, Issue: 1 | Magazine Article |
Today, we have the ability to utilize scalable, distributed computing environments within the confines of the Internet, a practice known as cloud computing. In this new world of computing, users are universally required to accept the underlying premise of trust. Within the cloud computing world, the virtual environment lets users access computing power that exceeds that contained within their own ...Show More

Data Security in the World of Cloud Computing

Lori M. Kaufman

Year: 2009 | Volume: 7, Issue: 4 | Magazine Article |
Americans are addicted to their personal digital assistants (PDAs), and President Barack Obama is no exception. Throughout the primaries and the presidential campaign, Obama was often seen using his BlackBerry. Once he won the election, great debate ensued as to whether he would be allowed to continue using it once in office. Initially, the secret service determined that his BlackBerry did not pro...Show More