scispace - formally typeset
J

Jesus Molina

Researcher at Fujitsu

Publications -  24
Citations -  2663

Jesus Molina is an academic researcher from Fujitsu. The author has contributed to research in topics: Intrusion detection system & Multi-factor authentication. The author has an hindex of 15, co-authored 24 publications receiving 2618 citations. Previous affiliations of Jesus Molina include University of Maryland, College Park.

Papers
More filters
Proceedings ArticleDOI

Controlling data in the cloud: outsourcing computation without outsourcing control

TL;DR: It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.
Proceedings Article

Wireless wallet

TL;DR: A framework for agreements in pervasive environments called the Universal Pervasive Transaction Framework (UPTF) for parties transacting in wireless insecure environments using mobile devices and one type of such agreement with commercial interest, namely mobile payments from a payer to a payee is discussed.
Proceedings Article

Copilot - a coprocessor-based kernel runtime integrity monitor

TL;DR: Copilot is a coprocessor-based kernel integrity monitor for commodity systems designed to detect malicious modifications to a host's kernel and has correctly detected the presence of 12 real-world rootkits within 30 seconds of their installation with less than a 1% penalty to the host's performance.
Proceedings ArticleDOI

Authentication in the clouds: a framework and its application to mobile users

TL;DR: The approach is based on a flexible framework for supporting authentication decisions the authors call TrustCube and on a behavioral authentication approach referred to as implicit authentication that results in a new authentication paradigm for users of mobile technologies.
Patent

Method and System for Implementing a Mobile Trusted Platform Module

TL;DR: In this paper, a method for implementing a mobile trusted platform module includes establishing a connection with a first remote host device via a remote interface, which also includes authenticating the connection.