Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Matthew W. Pagano is active.

Publication


Featured researches published by Matthew W. Pagano.


Journal of Cryptographic Engineering | 2013

Charm: a framework for rapidly prototyping cryptosystems

Joseph A. Akinyele; Christina Garman; Ian Miers; Matthew W. Pagano; Michael Rushanan; Matthew Green; Aviel D. Rubin

We describe Charm, an extensible framework for rapidly prototyping cryptographic systems. Charm provides a number of features that explicitly support the development of new protocols, including support for modular composition of cryptographic building blocks, infrastructure for developing interactive protocols, and an extensive library of re-usable code. Our framework also provides a series of specialized tools that enable different cryptosystems to interoperate. We implemented over 40 cryptographic schemes using Charm, including some new ones that, to our knowledge, have never been built in practice. This paper describes our modular architecture, which includes a built-in benchmarking module to compare the performance of Charm primitives to existing C implementations. We show that in many cases our techniques result in an order of magnitude decrease in code size, while inducing an acceptable performance impact. Lastly, the Charm framework is freely available to the research community and to date, we have developed a large, active user base.


security and privacy in smartphones and mobile devices | 2011

Securing electronic medical records using attribute-based encryption on mobile devices

Joseph A. Akinyele; Matthew W. Pagano; Matthew Green; Christoph U. Lehmann; Zachary N. J. Peterson; Aviel D. Rubin

We provide a design and implementation of self-protecting electronic medical records (EMRs) using attribute-based encryption on mobile devices. Our system allows healthcare organizations to export EMRs to locations outside of their trust boundary. In contrast to previous approaches, our solution is designed to maintain EMR availability even when providers are offline, i.e., where network connectivity is not available. To balance the needs of emergency care and patient privacy, our system is designed to provide fine-grained encryption and is able to protect individual items within an EMR, where each encrypted item may have its own access control policy. We implemented a prototype system using a new key- and ciphertext-policy attribute-based encryption library that we developed. Our implementation, which includes an iPhone app for storing and managing EMRs offline, allows for flexible and automated policy generation. An evaluation of our design shows that our ABE library performs well, has acceptable storage requirements, and is practical and usable on modern smartphones.


Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems | 2009

Securing medical records on smart phones

Ryan W. Gardner; Sujata Garera; Matthew W. Pagano; Matthew Green; Aviel D. Rubin

There is an inherent conflict between the desire to maintain privacy of ones medical records and the need to make those records available during an emergency. To satisfy both objectives, we introduce a flexible architecture for the secure storage of medical records on smart phones. In our system, a person can view her records at any time, and emergency medical personnel can view the records as long as the person is present (even if she is unconscious). Our solution allows for efficient revocation of access rights and is robust against adversaries who can access the phones storage offline.


digital identity management | 2011

Client-based authentication technology: user-centric authentication using secure containers

Conor P. Cahill; Jason Martin; Matthew W. Pagano; Vinay Phegade; Anand Rajan

Todays authentication suffers from unsolved problems in security and usability. Adversaries have multiple attack vectors with which to steal user credentials, including phishing, malware, and attacks on service providers. Current security practices such as password-complexity policies and idle timeouts often compromise usability. We propose our solution, Client-Based Authentication Technology (CBAT), to simultaneously improve security and usability in authentication. The main component of CBAT is our Trusted Identity Manager (TIM), which resides within a hardware-based secure container on the users system. The TIM asserts the users authentication to local and remote service providers without releasing the users credentials. In addition, the TIM non-intrusively monitors the users physical presence and locks the system if the user leaves. We provide architectural and implementation details of CBAT in hopes of improving current methods of authentication.


IACR Cryptology ePrint Archive | 2010

Self-Protecting Electronic Medical Records Using Attribute-Based Encryption

Matthew W. Pagano; Aviel D. Rubin; Zachary N. J. Peterson; Christoph U. Lehmann; Joseph A. Akinyele; Matthew Green


Journal of Computer Security | 2014

Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes

Joseph A. Akinyele; Matthew Green; Susan Hohenberger; Matthew W. Pagano


IACR Cryptology ePrint Archive | 2013

Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes.

Joseph A. Akinyele; Matthew Green; Susan Hohenberger; Matthew W. Pagano


Archive | 2011

Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems

Matthew W. Pagano


Archive | 2010

Design and Implementation of Views: Isolated Perspectives of a File System

Matthew W. Pagano; Zachary N. J. Peterson


Archive | 2009

Design and Implementation of Views: Isolated Perspectives of a File System for Regulatory Compliance

Matthew W. Pagano; Zachary N. J. Peterson

Collaboration


Dive into the Matthew W. Pagano's collaboration.

Top Co-Authors

Avatar

Matthew Green

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Aviel D. Rubin

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge