Institution
Worcester Polytechnic Institute
Education•Worcester, Massachusetts, United States•
About: Worcester Polytechnic Institute is a education organization based out in Worcester, Massachusetts, United States. It is known for research contribution in the topics: Population & Data envelopment analysis. The organization has 6270 authors who have published 12704 publications receiving 332081 citations. The organization is also known as: WPI.
Topics: Population, Data envelopment analysis, Supply chain, Nonlinear system, Finite element method
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A framework for supporting management decision-making about customization choices and the capabilities required to accomplish them is advanced and presents a useful way for managers to identify feasible customization options for their particular organization.
Abstract: A key issue in enterprise resource planning (ERP) implementation is how to find a match between the ERP system and an organization's business processes by appropriately customizing both the system and the organization. In this paper, we advance a framework for supporting management decision-making about customization choices and the capabilities required to accomplish them. In this framework, we identify various customization possibilities for business processes as well as ERP systems. We also identify technical and process change capabilities required for system and process customization. Combining customization options with change capabilities, we present a useful way for managers to identify feasible customization options for their particular organization. Such a framework also helps managers to recognize the gap between desired customization options and change capabilities. A case study is used to illustrate the application of the framework.
244 citations
••
[...]
243 citations
••
TL;DR: In this paper, the authors measured the kinetic parameters for water-gas shift reaction on Cu-based catalysts under fuel reformer conditions for fuel cell applications (7% CO, 8.5% CO2, 22% H2O, 37% H 2, and 25% Ar) at 1 atm total pressure and temperature in the range of 200°C.
242 citations
••
10 Apr 2011TL;DR: This paper proposes FindU, the first privacy-preserving personal profile matching schemes for mobile social networks, and proposes novel protocols that realize two of the user privacy levels, which can also be personalized by the users.
Abstract: Making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity of him/her. In existing systems for such services, usually all the users directly publish their complete profiles for others to search. However, in many applications, the users' personal profiles may contain sensitive information that they do not want to make public. In this paper, we propose FindU, the first privacy-preserving personal profile matching schemes for mobile social networks. In FindU, an initiating user can find from a group of users the one whose profile best matches with his/her; to limit the risk of privacy exposure, only necessary and minimal information about the private attributes of the participating users is exchanged. Several increasing levels of user privacy are defined, with decreasing amounts of exchanged profile information. Leveraging secure multi-party computation (SMC) techniques, we propose novel protocols that realize two of the user privacy levels, which can also be personalized by the users. We provide thorough security analysis and performance evaluation on our schemes, and show their advantages in both security and efficiency over state-of-the-art schemes.
242 citations
••
25 Sep 2017TL;DR: CacheZoom as discussed by the authors is able to track all memory accesses of SGX enclaves with high spatial and temporal precision, and it can recover AES keys from T-table based implementations with as few as ten measurements.
Abstract: In modern computing environments, hardware resources are commonly shared, and parallel computation is widely used. Parallel tasks can cause privacy and security problems if proper isolation is not enforced. Intel proposed SGX to create a trusted execution environment within the processor. SGX relies on the hardware, and claims runtime protection even if the OS and other software components are malicious. However, SGX disregards side-channel attacks. We introduce a powerful cache side-channel attack that provides system adversaries a high resolution channel. Our attack tool named CacheZoom is able to virtually track all memory accesses of SGX enclaves with high spatial and temporal precision. As proof of concept, we demonstrate AES key recovery attacks on commonly used implementations including those that were believed to be resistant in previous scenarios. Our results show that SGX cannot protect critical data sensitive computations, and efficient AES key recovery is possible in a practical environment. In contrast to previous works which require hundreds of measurements, this is the first cache side-channel attack on a real system that can recover AES keys with a minimal number of measurements. We can successfully recover AES keys from T-Table based implementations with as few as ten measurements.
241 citations
Authors
Showing all 6336 results
Name | H-index | Papers | Citations |
---|---|---|---|
Andrew G. Clark | 140 | 823 | 123333 |
Ming Li | 103 | 1669 | 62672 |
Joseph Sarkis | 101 | 482 | 45116 |
Arthur C. Graesser | 95 | 614 | 38549 |
Kevin J. Harrington | 85 | 682 | 33625 |
Kui Ren | 83 | 501 | 32490 |
Bart Preneel | 82 | 844 | 25572 |
Ming-Hui Chen | 82 | 525 | 29184 |
Yuguang Fang | 79 | 572 | 20715 |
Wenjing Lou | 77 | 311 | 29405 |
Bernard Lown | 73 | 330 | 20320 |
Joe Zhu | 72 | 231 | 19017 |
Y.S. Lin | 71 | 304 | 16100 |
Kevin Talbot | 71 | 268 | 15669 |
Christof Paar | 69 | 399 | 21790 |