J
Jesus Molina
Researcher at Fujitsu
Publications - 24
Citations - 2663
Jesus Molina is an academic researcher from Fujitsu. The author has contributed to research in topics: Intrusion detection system & Multi-factor authentication. The author has an hindex of 15, co-authored 24 publications receiving 2618 citations. Previous affiliations of Jesus Molina include University of Maryland, College Park.
Papers
More filters
Proceedings ArticleDOI
Controlling data in the cloud: outsourcing computation without outsourcing control
Richard Chow,Philippe Golle,Markus Jakobsson,Elaine Shi,Jessica Staddon,Ryusuke Masuoka,Jesus Molina +6 more
TL;DR: It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today.
Proceedings Article
Wireless wallet
TL;DR: A framework for agreements in pervasive environments called the Universal Pervasive Transaction Framework (UPTF) for parties transacting in wireless insecure environments using mobile devices and one type of such agreement with commercial interest, namely mobile payments from a payer to a payee is discussed.
Proceedings Article
Copilot - a coprocessor-based kernel runtime integrity monitor
TL;DR: Copilot is a coprocessor-based kernel integrity monitor for commodity systems designed to detect malicious modifications to a host's kernel and has correctly detected the presence of 12 real-world rootkits within 30 seconds of their installation with less than a 1% penalty to the host's performance.
Proceedings ArticleDOI
Authentication in the clouds: a framework and its application to mobile users
TL;DR: The approach is based on a flexible framework for supporting authentication decisions the authors call TrustCube and on a behavioral authentication approach referred to as implicit authentication that results in a new authentication paradigm for users of mobile technologies.
Patent
Method and System for Implementing a Mobile Trusted Platform Module
TL;DR: In this paper, a method for implementing a mobile trusted platform module includes establishing a connection with a first remote host device via a remote interface, which also includes authenticating the connection.