Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mark Alexander McGloin is active.

Publication


Featured researches published by Mark Alexander McGloin.


Computers & Security | 2016

Adaptive evidence collection in the cloud using attack scenarios

Liliana Pasquale; Sorren Hanvey; Mark Alexander McGloin; Bashar Nuseibeh

The increase in crimes targeting the cloud is increasing the amount of data that must be analysed during a digital forensic investigation, exacerbating the problem of processing such data in a timely manner. Since collecting all possible evidence proactively could be cumbersome to analyse, evidence collection should mainly focus on gathering the data necessary to investigate potential security breaches that can exploit vulnerabilities present in a particular cloud configuration. Cloud elasticity can also change the attack surface available to an adversary and, consequently, the way potential security breaches can arise. Therefore, evidence collection should be adapted depending on changes in the cloud configuration, such as those determined by allocation/deallocation of virtual machines. In this paper, we propose to use attack scenarios to configure more effective evidence collection for cloud services. In particular, evidence collection activities are targeted to detect potential attack scenarios that can violate existing security policies. These activities also adapt when new/different attack scenarios can take place due to changes in the cloud configuration. We illustrate our approach by using examples of insider and outsider attacks. Our results demonstrate that using attack scenarios allows us to target evidence collection activities towards those security breaches that are likely, while saving space and time necessary to store and process such data.


Archive | 2010

Method and system for authenticating a rich client to a web or cloud application

Olgierd Stanislaw Pieczul; Mark Alexander McGloin; Mary Ellen Zurko; David S. Kern; Brent Allan Hepburn


Archive | 2011

Authenticating a rich client from within an existing browser session

Olgierd Stanislaw Pieczul; Mark Alexander McGloin; Mary Ellen Zurko


Archive | 2012

Application and data removal system

Joseph Celi; Mark Alexander McGloin; Olgierd Stanislaw Pieczul


Archive | 2010

Method and apparatus for serving content elements of a markup language document protected against cross-site scripting attack

Olgierd Stanislaw Pieczul; Mark Alexander McGloin; Mary Ellen Zurko


Archive | 2012

Identifying guests in web meetings

Mark Alexander McGloin; Olgierd Stanislaw Pieczul; Mary Ellen Zurko


Archive | 2010

Method and apparatus for protecting markup language document against cross-site scripting attack

Olgierd Stanislaw Pieczul; Mark Alexander McGloin; Mary Ellen Zurko


Archive | 2010

Categorization Of Privacy Data And Data Flow Detection With Rules Engine To Detect Privacy Breaches

Mark Alexander McGloin; Olgierd Stanislaw Pieczul; Mary Ellen Zurko


Archive | 2010

Method and apparatus for context-aware output escaping using dynamic content marking

Olgierd Stanislaw Pieczul; Mark Alexander McGloin; Mary Ellen Zurko


Archive | 2010

Method and apparatus for dynamic content marking to facilitate context-aware output escaping

Olgierd Stanislaw Pieczul; Mark Alexander McGloin; Mary Ellen Zurko

Researchain Logo
Decentralizing Knowledge