[HTML][HTML] Trusted execution environments: Applications and organizational challenges

T Geppert, S Deml, D Sturzenegger… - Frontiers in Computer …, 2022 - frontiersin.org
… While all of an application's memory is encrypted by default in the virtual machine-based
model, in the process-based model, the application developer must selectively decide which …

Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes

A Sharma, ES Pilli, AP Mazumdar, P Gera - Computer Communications, 2020 - Elsevier
… Authors exploit recent advancement in program counter based access control to design
hardware-based trusted computing base and protected module architecture, called Sancus. The …

[PDF][PDF] Security, privacy research issues in various computing platforms: A survey and the road ahead.

AK Tyagi, MM Nair, S Niladhuri… - Journal of Information …, 2020 - ak-tyagi.com
… on several computing platforms, then we find that Security, Privacy and Trust are highly …
Security and Privacy are highly essential for every computing platform/ environment, for example, …

Toward trust in Internet of Things ecosystems: Design principles for blockchain-based IoT applications

J Lockl, V Schlatt, A Schweizer… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
design science approach in Section III and derive design objectives in Section IV. In Section
V, we present the design and deployment of the artifact, which we evaluate to derive design

[HTML][HTML] Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions

W Li, J Wu, J Cao, N Chen, Q Zhang… - … of Cloud Computing, 2021 - Springer
… In general, there are three major trust risks in cloud computing platform. … Trust-based
mechanisms mainly include the design of trust decision and the efficient maintenance of trust. …

Resource allocation and trust computing for blockchain-enabled edge computing system

L Zhang, Y Zou, W Wang, Z Jin, Y Su, H Chen - Computers & Security, 2021 - Elsevier
… We design a group-agent strategy with trust computing. Trust computing is completed by …
In Sections 5 and 6, we introduce the group-agent strategy base on trust computing and the …

Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - … on Computer Systems, 2020 - dl.acm.org
… cute arbitrary applications, the systems built on SGXv1 have inflated the Trusted Computing
… As only Intel can make changes to the inherent design trade-offs in SGX, users had to wait …

An overview of hardware security and trust: Threats, countermeasures, and design tools

W Hu, CH Chang, A Sengupta, S Bhunia… - … on Computer-Aided …, 2020 - ieeexplore.ieee.org
… for crafting an architectural level trusted computing environment enhanced with strong isolation
… the security primitives and trusted computing environment are free of design flaws, covert …

A survey on IoT platforms: Communication, security, and privacy perspectives

L Babun, K Denney, ZB Celik, P McDaniel… - Computer Networks, 2021 - Elsevier
… IoT platforms that target different application domains (eg, commodity IoT, industry, agriculture,
etc.) into this survey. We include IoT platforms from different application … to platforms from …

Architectural design alternatives based on cloud/edge/fog computing for connected vehicles

H Wang, T Liu, BG Kim, CW Lin… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
… In addition, Cloudlet is one of the most typical edge computing platforms, where a cluster of
… and design considerations of using cloud/edge/fog computing for CV applications. Existing …