Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Performance Monitoring and Dynamic Scaling Algorithm for Queue Based Internet of Things
A Sharma, BM Sathisha, P Pavankumar… - … and Smart Electrical …, 2022 - ieeexplore.ieee.org
It has developed over the last four decades, becoming an essential component of distributed
systems. At its inception, it was designed to simplify application development by running on …
systems. At its inception, it was designed to simplify application development by running on …
In. IoT—A new middleware for Internet of Things
MAA da Cruz, JJPC Rodrigues… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The evolution of Internet of Things (IoT) led to the construction of many IoT middleware, a
software that plays a key role since it supports the communication among devices, users …
software that plays a key role since it supports the communication among devices, users …
Confidential computing in cloud/fog-based Internet of Things scenarios
Abstract Internet of Things (IoT) devices are increasingly present in people's daily lives,
collecting different types of data about the environment, user behavior, medical data, and …
collecting different types of data about the environment, user behavior, medical data, and …
Tamper-proof access control for IoT clouds using enclaves
Abstract Internet of Things (IoT) devices rely on cloud computing for processing user-
sensitive data, like health recordings and geolocalization. In this case, security primitives like …
sensitive data, like health recordings and geolocalization. In this case, security primitives like …
Confidential computing across edge-to-cloud for machine learning: A survey study
Confidential computing has gained prominence due to the escalating volume of data-driven
applications (eg, machine learning and big data) and the acute desire for secure processing …
applications (eg, machine learning and big data) and the acute desire for secure processing …
[PDF][PDF] Trusted Execution Environments for Cloud/Fog-based Internet of Things Applications.
Cloud services and fog-based solutions can improve the communication and processing
efficiency of the Internet of Things (IoT). Cloud and fog servers offer more processing power …
efficiency of the Internet of Things (IoT). Cloud and fog servers offer more processing power …
Formal verification of a trusted execution environment-based architecture for IoT applications
DCG Valadares, ÁACC Sobrinho… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
The Internet-of-Things (IoT) scenarios commonly present security and privacy concerns,
either due to the processing constraints of devices or the employment of external servers to …
either due to the processing constraints of devices or the employment of external servers to …
Intel Software Guard Extensions in Internet of Things scenarios: A systematic mapping study
Due to the Internet of Things (IoT) devices' processing and memory constraints, the
processing and analysis of data acquired by such devices are generally performed in a fog …
processing and analysis of data acquired by such devices are generally performed in a fog …
802.11 g signal strength evaluation in an industrial environment
DCG Valadares, JMFR de Araújo, MA Spohn… - Internet of Things, 2020 - Elsevier
The advances in wireless network technologies and Industrial Internet of Things (IIoT)
devices are easing the establishment of what is called Industry 4.0. For the industrial …
devices are easing the establishment of what is called Industry 4.0. For the industrial …