Trustworthy confidential virtual machines for the masses
A Galanou, K Bindlish, L Preibsch, YA Pignolet… - Proceedings of the 24th …, 2023 - dl.acm.org
Confidential computing alleviates the concerns of distrustful customers by removing the
cloud provider from their trusted computing base and resolves their disincentive to migrate …
cloud provider from their trusted computing base and resolves their disincentive to migrate …
Principled microarchitectural isolation on cloud CPUs
We present Marghera, a system design that prevents cross-VM microarchitectural side-
channel attacks in the cloud. Marghera is based on isolation contracts which, for a given …
channel attacks in the cloud. Marghera is based on isolation contracts which, for a given …
Confidential Consortium Framework: Secure multiparty applications with confidentiality, integrity, and high availability
Confidentiality, integrity protection, and high availability, abbreviated to CIA, are essential
properties for trustworthy data systems. The rise of cloud computing and the growing …
properties for trustworthy data systems. The rise of cloud computing and the growing …
ExclaveFL: Providing Transparency to Federated Learning using Exclaves
In federated learning (FL), data providers jointly train a model without disclosing their
training data. Despite its privacy benefits, a malicious data provider can simply deviate from …
training data. Despite its privacy benefits, a malicious data provider can simply deviate from …
Systems and methods for identifying and determining third party compliance
J Glasco Jr, BD Hardman, R Brice - US Patent 12,137,032, 2024 - Google Patents
A method for determining third party network compliance with a host entity network is
provided. The method may include generating a scanning file that includes host entity …
provided. The method may include generating a scanning file that includes host entity …
Assessment plug-in system for providing binary digitally signed results
J Glasco Jr, BD Hardman, R Brice - US Patent 11,893,116, 2024 - Google Patents
A method for determining third party network compliance with a host entity network is
provided. The method may include generating a scanning file that includes host entity …
provided. The method may include generating a scanning file that includes host entity …
Service definition generation using paired infrastructures
K Ando - US Patent 12,008,410, 2024 - Google Patents
An information processing system performs load distribution across a first infrastructure and
a second infrastructure having mutually different billing systems. The first infrastructure pairs …
a second infrastructure having mutually different billing systems. The first infrastructure pairs …
Information processing system, information processing method and infrastructure
K Ando - US Patent App. 17/398,189, 2022 - Google Patents
An information processing system performs load distribu tion across a first infrastructure and
a second infrastructure having mutually different billing systems. The first infra structure pairs …
a second infrastructure having mutually different billing systems. The first infra structure pairs …