A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Personal database security and trusted execution environments
2019
Proceedings of the VLDB Endowment
data management solutions relevant to the personal context; (3) discuss new challenges at the intersection of PDMS security and TEE-based data management. ...
Smart disclosure initiatives and new regulations such as GDPR in the EU increase the interest for Personal Data Management Systems (PDMS) being provided to individuals to preserve their entire digital ...
Conclusions drawn from Parts 1 and 2 allow us to define an abstract architecture for an extensive and secure PDMS, and sketch important open research issues. ...
doi:10.14778/3352063.3352118
fatcat:7vb3vx5lqfd3zedwpdw7gdltee
Secure Data Processing in the Cloud
[chapter]
2018
Communications in Computer and Information Science
with a combination of innovative security solutions, data lifecycle management techniques, run-time adaptation, and automated risk management. ...
This paper gives an overview about the project's goals and current status. ...
The research leading to these results has received funding from the European Community's Horizon 2020 research and innovation programme under grant agreement n° 731678. ...
doi:10.1007/978-3-319-79090-9_10
fatcat:awy36ivx6vgvff5vrsi4h7ncgy
Secure Software Defined Networks Controller Storage using Intel Software Guard Extensions
2020
International Journal of Advanced Computer Science and Applications
This paper introduces an SGX enabled SDN controller. ...
Intel's Software Guard Extension (SGX) offers a sloid layer of security applied to applications by creating a Trusted execution environment. ...
SDN Enabled SGX Architecture SDN enabled SGX model operates as an intermediate system. ...
doi:10.14569/ijacsa.2020.0111060
fatcat:ro2ztj673fbzbnfndeidb4mefi
Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX)
[article]
2018
arXiv
pre-print
We propose a new component for key management that, together with other FIWARE components, can be used to provide privacy, confidentiality, and integrity guarantees for IoT data. ...
We present a solution that considers the security components of FIWARE and the Intel SGX capabilities. ...
First, we use the Intel TEE technology, named Software Guard Extensions (SGX). We propose a component responsible for key generation, storage and management, named Key Vault. ...
arXiv:1806.01906v1
fatcat:zxrfeiik3vc7tpj7amoywxkbu4
LogSafe: Secure and Scalable Data Logger for IoT Devices
2018
2018 IEEE/ACM Third International Conference on Internet-of-Things Design and Implementation (IoTDI)
Using the security guarantees of SGX, LogSafe is designed to run on an untrusted cloud infrastructure and satisfies Confidentiality, Integrity, and Availability (CIA) security properties. ...
Using the security guarantees of SGX, LogSafe is designed to run on an untrusted cloud infrastructure and satisfies Confidentiality, Integrity, and Availability (CIA) security properties. ...
ACKNOWLEDGMENT This work was supported in part by NSF CNS-1505799 and the Intel-NSF Partnership for Cyber-Physical Systems Security and Privacy and by ONR N000141712012 ...
doi:10.1109/iotdi.2018.00023
dblp:conf/iotdi/NguyenIPSWL18
fatcat:x2cmi4236rcdxhw2btw5wl5pwq
Using innovative instructions to create trustworthy software solutions
2013
Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy - HASP '13
Intel is developing innovative security technology that allows software developers control of the security of sensitive code and data by creating trusted domains within applications to protect critical ...
This paper will show how protection of private information, including enterprise rights management, video chat, trusted financial transactions, among others, has been demonstrated using this technology ...
Finally we wish to recognize the support of the United States Department of Homeland Security and the United States Air Force Academy in the design and prototyping of the ERM and Secure Video Conferencing ...
doi:10.1145/2487726.2488370
dblp:conf/isca/HoekstraLPPC13
fatcat:jbfsmq5c4feczbfmbjkdacvvnq
SecFL: Confidential Federated Learning using TEEs
[article]
2021
arXiv
pre-print
FL helps reduce data privacy risks. Unfortunately, FL still exist several issues regarding privacy and security. ...
Thus, all malicious clients can be detected using the remote attestation mechanisms. ...
In SecFL, the input training data and code are encrypted using the file system shield of SCONE, and then decrypted and processed inside SGX enclaves which cannot be accessed even by strong attackers with ...
arXiv:2110.00981v2
fatcat:72tntbjskrakfntsztmbm2kjvy
A Distributed Access Control System for Cloud Federations
2017
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
The system also guarantees the integrity of the policy evaluation process by using blockchain technology and Intel SGX trusted hardware. ...
We propose a novel identity and access management system for cloud federations. ...
In this paper we present an identity and access management system for secure data sharing in cloud federations. ...
doi:10.1109/icdcs.2017.241
dblp:conf/icdcs/AlansariPS17
fatcat:pvgu2ui6kjfhzgsgfsz546s2s4
A comparison study of intel SGX and AMD memory encryption technology
2018
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy - HASP '18
Recently, Intel Software Guard eXtensions (SGX) and AMD Memory Encryption Technology have been introduced. ...
CCS CONCEPTS • Security and privacy → Security in hardware; Systems security; Hardware security implementation; KEYWORDS Intel SGX, AMD SEV, hardware-supported security ACM Reference Format: Saeid Mofrad ...
CICI-1738929 and IIS-1724227. Weidong Shi is supported by NATO Science for Peace and Security Programme (G4919) and National Science Foundation DGE 1433817. ...
doi:10.1145/3214292.3214301
dblp:conf/isca/MofradZLS18
fatcat:f6w3qugembdl3kcdn7vug6f5u4
Leveraging Intel SGX to Create a Nondisclosure Cryptographic library
[article]
2018
arXiv
pre-print
Intel Software Guard Extension (Intel SGX) is an Intel technology for developers who are looking to protect their software binaries from plausible attacks using hardware instructions. ...
In this project we leverage the Intel SGX to produce a secure cryptographic library which keeps the generated keys inside an enclave restricting use and dissemination of confidential cryptographic keys ...
On the other hand, combining TXT with Intel Virtual Machine Extension (VMX) allows system developers to create secure operating systems. ...
arXiv:1705.04706v3
fatcat:nkxwc3u2cbfkvnk4llqieh6j2y
Secure IoT Data Analytics in Cloud via Intel SGX
[article]
2020
arXiv
pre-print
We evaluate the framework by executing rule-based programs in the SGX securely with both simulated and real IoT device data. ...
The growing adoption of IoT devices in our daily life is engendering a data deluge, mostly private information that needs careful maintenance and secure storage system to ensure data integrity and protection ...
supported in part by NIH award 1R01HG006844, NSF awards CICI-1547324, IIS-1633331, CNS-1837627, OAC-1828467, DMS-1737978, DGE-2039542, MRI-1828467, ARO award W911NF-17-1-0356, FAIN award number 1906630, and ...
arXiv:2008.05286v1
fatcat:43bc5a24tneazipvhrfysypaqu
Performance Principles for Trusted Computing with Intel SGX
[chapter]
2018
Communications in Computer and Information Science
This paper investigates and demonstrates the added cost of using SGX, and further argues that great care must be taken when designing system software in order to avoid the performance penalty incurred ...
Personal data is often accompanied by strict privacy and security policies, requiring data processing to be governed by nontrivial enforcement mechanisms. ...
We would like to thank Robbert van Renesse for his insights and discussions, and anonymous reviewers for their useful insights and comments. ...
doi:10.1007/978-3-319-94959-8_1
fatcat:ulk2ugzopzgqjfur2x6jbiuezy
D4.3 - Interoperability of ITEEs in the context of eHealth systems
2020
Zenodo
This deliverable contains a framework of components and enablers to facilitate the development of applications that are portable across ITEEs from different vendors and effectively address the security ...
needs specific to the context of eHealth systems. ...
users benefit from greater simplicity, convenience, security and privacy for their digital services and personal data. ...
doi:10.5281/zenodo.4022371
fatcat:3jzz7scyqbfszokkbte4lc7mlu
On the Trade-Offs of Combining Multiple Secure Processing Primitives for Data Analytics
[chapter]
2020
Lecture Notes in Computer Science
SafeSpark is modular and extensible therefore adapting to data analytics applications with different performance, security and functionality requirements. ...
To this end, different secure analytics techniques and systems have recently emerged. ...
The research leading to these results has received funding from the European Union's Horizon 2020 -The EU Framework Programme for Research and Innovation 2014-2020, under grant agreement No. 857237 and ...
doi:10.1007/978-3-030-50323-9_1
fatcat:rbzfhfnrk5hobkfw26kfswgrs4
Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave Development
[article]
2020
arXiv
pre-print
Our work can effectively reduce the engineering cost of developing SGX enclaves for privacy-preserving data processing and exchange. ...
Our supply chain accepts upstream patches in a timely manner with SGX-specific security auditing. ...
The societal and economical benefits of analyzing large volumes of real-world data have led to personal data being collected and transferred at an unprecedented scale. ...
arXiv:2005.04367v1
fatcat:qsshclabdfannipde426joqcni
« Previous
Showing results 1 — 15 out of 827 results