Intel software guard extensions applications: A survey

NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …

Towards data assurance and resilience in IoT using blockchain

X Liang, J Zhao, S Shetty, D Li - MILCOM 2017-2017 IEEE …, 2017 - ieeexplore.ieee.org
Data assurance and resilience are crucial security issues in cloud-based IoT applications.
With the widespread adoption of drones in IoT scenarios such as warfare, agriculture and …

TSP security in intelligent and connected vehicles: Challenges and solutions

Y Li, Q Luo, J Liu, H Guo, N Kato - IEEE Wireless …, 2019 - ieeexplore.ieee.org
The rapid development of IoT, cloud computing, Artificial Intelligence (AI), big data, and 5G
technologies has promoted the transformation of traditional vehicles toward ICVs. Compared …

Cyber-storms come from clouds: Security of cloud computing in the IoT era

M De Donno, A Giaretta, N Dragoni, A Bucchiarone… - Future Internet, 2019 - mdpi.com
The Internet of Things (IoT) is rapidly changing our society to a world where every “thing” is
connected to the Internet, making computing pervasive like never before. This tsunami of …

Secured routines: Language-based construction of trusted execution environments

A Ghosn, JR Larus, E Bugnion - 2019 USENIX Annual Technical …, 2019 - usenix.org
Trusted Execution Environments (TEEs), such as Intel SGX's enclave, use hardware to
ensure the confidentiality and integrity of operations on sensitive data. While the technology …

Attack surface analysis of permissioned blockchain platforms for smart cities

A Davenport, S Shetty, X Liang - 2018 IEEE International Smart …, 2018 - ieeexplore.ieee.org
In this paper, we explore the attack surfaces in open source permissioned blockchain project
Hyperledger Fabric that can be exploited and compromised through cryptographic tactics …

A blockchain-based decentralized cloud resource scheduling architecture

H Zhu, Y Wang, X Hei, W Ji… - … on Networking and …, 2018 - ieeexplore.ieee.org
Application services in cloud computing model have complex scheduling, composition,
configuration and deployment conditions, even in the multi-condition requirements, it can …

Cloud virtual machine lifecycle security framework based on trusted computing

X Jin, Q Wang, X Li, X Chen… - Tsinghua Science and …, 2019 - ieeexplore.ieee.org
As a foundation component of cloud computing platforms, Virtual Machines (VMs) are
confronted with numerous security threats. However, existing solutions tend to focus on …

Integrity protection against insiders in microservice-based infrastructures: From threats to a security framework

M Ahmadvand, A Pretschner, K Ball… - … and Foundations: STAF …, 2018 - Springer
Building microservices involves continuous modifications at design, deployment, and run
times. The DevOps notion together with the “you built it, you run it” paradigm often result in a …

[PDF][PDF] Study on the technical evaluation of de-identification procedures for personal data in the automotive sector

K Rannenberg, S Pape, F Tronnier, S Löbner - 2021 - pape.science
The following document represents the final report on the project “Study on the technical
evaluation of de-identification procedures for personal data” by Prof. Dr. Rannenberg from …