Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Clemson University

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Adversarial Deep Learning And Security With A Hardware Perspective, Joseph Clements May 2023

Adversarial Deep Learning And Security With A Hardware Perspective, Joseph Clements

All Dissertations

Adversarial deep learning is the field of study which analyzes deep learning in the presence of adversarial entities. This entails understanding the capabilities, objectives, and attack scenarios available to the adversary to develop defensive mechanisms and avenues of robustness available to the benign parties. Understanding this facet of deep learning helps us improve the safety of the deep learning systems against external threats from adversaries. However, of equal importance, this perspective also helps the industry understand and respond to critical failures in the technology. The expectation of future success has driven significant interest in developing this technology broadly. Adversarial deep …


Scalable Capability-Based Authorization For High-Performance Parallel File Systems, Nicholas Mills May 2011

Scalable Capability-Based Authorization For High-Performance Parallel File Systems, Nicholas Mills

All Theses

As the size and scale of supercomputers continues to increase at an
exponential rate the number of users on a given supercomputer will
only grow larger. A larger number of users on a supercomputer places a
greater importance on the strength of information security. Nowhere is
this requirement for security more apparent than the file system, as
users expect their data to be protected from accidental or deliberate
modification.
In spite of the ever-increasing demand for more secure file system
access the majority of parallel file systems do not implement a robust
security protocol for fear it will negatively impact …