The proposed protocol offers privacy-preserving authentication across several cloud platforms, flexible key management for consumer data protection, and effective user revocation. Performance evaluation demonstrates that the proposed framework supports low latency, safe unified remote access, and data privacy in the contemporary edge-enabled environment.
{"title":"Effective Data Sharing in an Edge–Cloud Model: Security Challenges and Solutions","authors":"Arijit Karati, Sajal K. Das","doi":"10.1109/mc.2024.3367590","DOIUrl":"https://doi.org/10.1109/mc.2024.3367590","url":null,"abstract":"The proposed protocol offers privacy-preserving authentication across several cloud platforms, flexible key management for consumer data protection, and effective user revocation. Performance evaluation demonstrates that the proposed framework supports low latency, safe unified remote access, and data privacy in the contemporary edge-enabled environment.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"27 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Career Center","authors":"","doi":"10.1109/mc.2024.3408592","DOIUrl":"https://doi.org/10.1109/mc.2024.3408592","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"25 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE IT Professionals Call for Articles","authors":"","doi":"10.1109/mc.2024.3408549","DOIUrl":"https://doi.org/10.1109/mc.2024.3408549","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"60 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We discuss explainability and understandability in artificial intelligence (AI) and offer an experiment and a discussion of responses, challenges, and obstacles. The pursuit of AI explainability and understandability is crucial and ignored at our peril.
{"title":"What’s in an AI’s Mind’s Eye? We Must Know","authors":"Moshe Sipper, Raz Lapid","doi":"10.1109/mc.2024.3356820","DOIUrl":"https://doi.org/10.1109/mc.2024.3356820","url":null,"abstract":"We discuss explainability and understandability in artificial intelligence (AI) and offer an experiment and a discussion of responses, challenges, and obstacles. The pursuit of AI explainability and understandability is crucial and ignored at our peril.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"144 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141528003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We present the first comprehensive framework for implementing metamorphic fault tolerance. A key innovation in this framework is the application of risk formulas to evaluate the likelihood of inputs producing trustworthy outputs. Experiments demonstrate its effectiveness, especially without the need of test oracles.
{"title":"Metamorphic Fault Tolerance: Addressing the Oracle Problem of Reliability Assurance for Contemporary Software Systems","authors":"Zheng Zheng, Daixu Ren, Huai Liu, Tsong Yueh Chen","doi":"10.1109/mc.2024.3390759","DOIUrl":"https://doi.org/10.1109/mc.2024.3390759","url":null,"abstract":"We present the first comprehensive framework for implementing metamorphic fault tolerance. A key innovation in this framework is the application of risk formulas to evaluate the likelihood of inputs producing trustworthy outputs. Experiments demonstrate its effectiveness, especially without the need of test oracles.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"45 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141527992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IEEE Computer Society Call for Papers","authors":"","doi":"10.1109/mc.2024.3408522","DOIUrl":"https://doi.org/10.1109/mc.2024.3408522","url":null,"abstract":"","PeriodicalId":10623,"journal":{"name":"Computer","volume":"60 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141528008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We discuss a few of today’s most pressing internal and external threats to higher education.
我们将讨论当今高等教育面临的一些最紧迫的内部和外部威胁。
{"title":"A Collapsing Academy V: Internal and External Threat Vectors Facing Higher Education","authors":"Hal Berghe","doi":"10.1109/mc.2024.3395110","DOIUrl":"https://doi.org/10.1109/mc.2024.3395110","url":null,"abstract":"We discuss a few of today’s most pressing internal and external threats to higher education.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"46 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141528014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}