Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Towards data assurance and resilience in IoT using blockchain
Data assurance and resilience are crucial security issues in cloud-based IoT applications.
With the widespread adoption of drones in IoT scenarios such as warfare, agriculture and …
With the widespread adoption of drones in IoT scenarios such as warfare, agriculture and …
TSP security in intelligent and connected vehicles: Challenges and solutions
The rapid development of IoT, cloud computing, Artificial Intelligence (AI), big data, and 5G
technologies has promoted the transformation of traditional vehicles toward ICVs. Compared …
technologies has promoted the transformation of traditional vehicles toward ICVs. Compared …
Cyber-storms come from clouds: Security of cloud computing in the IoT era
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is
connected to the Internet, making computing pervasive like never before. This tsunami of …
connected to the Internet, making computing pervasive like never before. This tsunami of …
Secured routines: Language-based construction of trusted execution environments
Trusted Execution Environments (TEEs), such as Intel SGX's enclave, use hardware to
ensure the confidentiality and integrity of operations on sensitive data. While the technology …
ensure the confidentiality and integrity of operations on sensitive data. While the technology …
Attack surface analysis of permissioned blockchain platforms for smart cities
In this paper, we explore the attack surfaces in open source permissioned blockchain project
Hyperledger Fabric that can be exploited and compromised through cryptographic tactics …
Hyperledger Fabric that can be exploited and compromised through cryptographic tactics …
A blockchain-based decentralized cloud resource scheduling architecture
H Zhu, Y Wang, X Hei, W Ji… - … on Networking and …, 2018 - ieeexplore.ieee.org
Application services in cloud computing model have complex scheduling, composition,
configuration and deployment conditions, even in the multi-condition requirements, it can …
configuration and deployment conditions, even in the multi-condition requirements, it can …
Cloud virtual machine lifecycle security framework based on trusted computing
As a foundation component of cloud computing platforms, Virtual Machines (VMs) are
confronted with numerous security threats. However, existing solutions tend to focus on …
confronted with numerous security threats. However, existing solutions tend to focus on …
Integrity protection against insiders in microservice-based infrastructures: From threats to a security framework
M Ahmadvand, A Pretschner, K Ball… - … and Foundations: STAF …, 2018 - Springer
Building microservices involves continuous modifications at design, deployment, and run
times. The DevOps notion together with the “you built it, you run it” paradigm often result in a …
times. The DevOps notion together with the “you built it, you run it” paradigm often result in a …
[PDF][PDF] Study on the technical evaluation of de-identification procedures for personal data in the automotive sector
The following document represents the final report on the project “Study on the technical
evaluation of de-identification procedures for personal data” by Prof. Dr. Rannenberg from …
evaluation of de-identification procedures for personal data” by Prof. Dr. Rannenberg from …