Filters








5,242 Hits in 5.2 sec

In Guards We Trust: Security and Privacy in Operating Systems Revisited

Michael Hanspach, Jorg Keller
2013 2013 International Conference on Social Computing  
The storage guard, the audio filtering guard and the sequencing guard are specifically targeted at providing solutions to three common security and privacy problems in componentbased operating systems.  ...  But, not every problem in computer security and privacy could possibly be solved by a trusted micro kernel, because we have higher level security and privacy concepts like packet filtering, data encryption  ...  ACKNOWLEDGMENT We would like to thank Alexander Senier for helpful discussions on the storage guard.  ... 
doi:10.1109/socialcom.2013.87 dblp:conf/socialcom/HanspachK13 fatcat:kuxgjhjhzbe6pegvbz4snwv6g4

Time to Rethink: Trust Brokerage Using Trusted Execution Environments [chapter]

Patrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz, Maria Zhdanova
2015 Lecture Notes in Computer Science  
As the assurance and availability of hardware-based Trusted Execution Environments (TEEs) is increasing, we propose an alternative direction of using TEEs as "neutral" environments for efficient yet secure  ...  However, currently available de-identification schemes tend to suffer from privacy/utility tradeoffs, and MPC has found deployment only in niche applications.  ...  Advancements in Trusted Execution Trusted Execution Environments (TEEs) allow the execution of software in such a way that the main operating system and other "untrusted" software outside the TEE and its  ... 
doi:10.1007/978-3-319-22846-4_11 fatcat:ixdllo7h7zc6zb3fygbzyba24u

In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security [chapter]

Yianna Danidou, Burkhard Schafer
2009 IFIP Advances in Information and Communication Technology  
A possible response is to mirror the shift in power by a shift in legal responsibility, creating new legal liabilities and duties for software companies as the new guardians of internet security.  ...  This paper analyses potential legal responses and consequences to the anticipated roll out of Trusted Computing (TC).  ...  Proponents state that the implementation and application of technologies that provide TC will increase users' trust in their ability to protect their systems from malicious code and guard their data from  ... 
doi:10.1007/978-3-642-01244-0_35 fatcat:gq5zm6edoreghhwchgmfy4wfhe

Self-Expiring Data Capsule using Trusted Execution Environment [article]

Hung Dang, Ee-Chien Chang
2019 arXiv   pre-print
We implement the proposed framework in a system called TEEKAP.  ...  Data privacy is unarguably of extreme importance. Nonetheless, there exist various daunting challenges to safe-guarding data privacy.  ...  Controlled-channel attacks: Deterministic side channels for untrusted operating systems. In Security and Privacy (SP), 2015 IEEE Symposium on, pages 640–656.  ... 
arXiv:1911.09305v1 fatcat:gun326ntpbhntazceelcnqd6eq

Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities

Joseph I. Choi, Kevin R. B. Butler
2019 Security and Communication Networks  
This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC.  ...  This paper also addresses three open challenges: (1) defeating malicious adversaries, (2) mobile-friendly TEE-supported SMC, and (3) a more general coupling of trusted hardware and privacy-preserving computation  ...  Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work.  ... 
doi:10.1155/2019/1368905 fatcat:izynm6msrvehfa3ghkw7tykk34

Open-TEE -- An Open Virtual Trusted Execution Environment

Brian McGillion, Tanel Dettenborn, Thomas Nyman, N. Asokan
2015 2015 IEEE Trustcom/BigDataSE/ISPA  
Tools and software needed to develop and debug trusted applications may be expensive or non-existent. In this paper, we describe Open-TEE, a virtual, hardware-independent TEE implemented in software.  ...  It allows developers to develop and debug trusted applications with the same tools they use for developing software in general.  ...  Acknowledgments: We thank the participants of the user study for their time and their useful feedback. Thanks to Kumaripaba Athukorala for advice on conducting the user study.  ... 
doi:10.1109/trustcom.2015.400 dblp:conf/trustcom/McGillionDNA15 fatcat:saxzddga3rezlcgfltlgpta3ay

Low-Trust Policing in a High-Trust Society - The Norwegian Police Immigration Detention Centre and the Search for Public Sphere Legitimacy

Thomas Ugelvik
2016 Nordisk Politiforskning  
and trust.  ...  to overcrowding and the use of poorly trained private security guards.  ... 
doi:10.18261/issn.1894-8693-2016-02-08 fatcat:pxf72yzwpfacfh52owdp2e5gmm

Decentralized Trusted Computing Base for Blockchain Infrastructure Security

Thomas Hardjono, Ned Smith
2019 Frontiers in Blockchain  
We also thank the numerous colleagues at Intel who have made valuable contributions to trusted computing including Frank McKeen, Claire Vishik, David Grawrock, Vinnie Scarlata, Simon Johnson, David M.  ...  We especially want to thank Jennifer E. Koerv for being an advocate and champion of this work.  ...  The Trusted Computing Group The TCSEC criteria focused mostly on operating system security. However, the operating system is not the sole TCB component in a platform.  ... 
doi:10.3389/fbloc.2019.00024 fatcat:zws2jsbi7zecjpmpo2unxz62bq

SoK: Introspections on Trust and the Semantic Gap

Bhushan Jain, Mirza Basim Baig, Dongli Zhang, Donald E. Porter, Radu Sion
2014 2014 IEEE Symposium on Security and Privacy  
This paper organizes previous work based on the essential design considerations when building a VMI system, and then explains how these design choices dictate the trust model and security properties of  ...  Although this choice is reasonable in some contexts and has facilitated progress, the ultimate goal of reducing the trusted computing base of software systems is best served by a fresh look at the VMI  ...  ACKNOWLEDGEMENTS We thank our shepherd, Virgil Gligor, and the anonymous reviewers for their insightful comments on earlier versions of this paper.  ... 
doi:10.1109/sp.2014.45 dblp:conf/sp/JainBZPS14 fatcat:zpldjgsmcfdvhgx252dewbh33y

Enhancing the security of mobile health monitoring systems through trust negotiations

Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung
2011 2011 IEEE 36th Conference on Local Computer Networks  
These systems must retain the privacy and the security of the data exchanged.  ...  In [21] , privacy and security were differentiated. The study points out that some approaches provided solutions to privacy while others stressed the security of Uhealth system.  ...  Appendix A: Setting up the Experiment Basically, we need to install and configure a few things to begin development: • Android SDK • Eclipse • Hex Editor • WampServer • OpenSSL Android SDK: The Android  ... 
doi:10.1109/lcn.2011.6115545 dblp:conf/lcn/ElkhodrSC11 fatcat:jdkamb7kdvd6rhqhuw2v6xlx2q

Palantir

Himanshu Khurana, Jim Basney, Mehedi Bakht, Mike Freemon, Von Welch, Randy Butler
2009 Proceedings of the 8th Symposium on Identity and Trust on the Internet - IDtrust '09  
In the face of increasing complexity and frequency of such attacks, we argue that it is insufficient to rely on organizational incident response teams or even trusted coordinating response teams.  ...  Based on our approach we present the Palantir system that comprises conceptual and technological capabilities to adequately respond to such attacks.  ...  We would like to thank the members of the NCSA Incident Response team, whose efforts in Incident 216 and subsequent discussions led to our understanding of these challenges.  ... 
doi:10.1145/1527017.1527023 dblp:conf/idtrust/KhuranaBBFWB09 fatcat:c5fjluikrfdwndn6w4zi6nbuqi

Cloud virtual machine lifecycle security framework based on trusted computing

Xin Jin, Qixu Wang, Xiang Li, Xingshu Chen, Wei Wang
2019 Tsinghua Science and Technology  
In this paper, we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats to VMs throughout their entire lifecycle.  ...  Then, a trusted computing based security protection framework is developed, which can extend the trusted relationship from trusted platform module to the VM and protect the security and reliability of  ...  SCU2018D018 and SCU2018D022).  ... 
doi:10.26599/tst.2018.9010129 fatcat:g7zeupvllfc7ni3oy5zhu6tmje

Operating System Security

Trent Jaeger
2008 Synthesis Lectures on Information Security Privacy and Trust  
He joined Penn State after working for IBM Research for nine years in operating systems and system security research groups.  ...  Christoph has taught undergraduate and graduate courses in computer and network security, cryptography, operating systems, and distributed systems at San José  ...  revisited.  ... 
doi:10.2200/s00126ed1v01y200808spt001 fatcat:o7qgtis6zffr3disdujoq4izaa

What the Publisher Can Teach the Patient: Intellectual Property and Privacy in an Era of Trusted Privication

Jonathan Zittrain
2000 Social Science Research Network  
in that system as "trust" when their privacy has not been incorporated into traditional federal privacy frameworks to begin with.  ...  A trusted system is one that can be trusted by a rights-holder as against the user of the system-even if the physical system is in the custody of the user.  ... 
doi:10.2139/ssrn.214468 fatcat:noq34kduojd7nciwqk37pec2ea

Identity-Based Mediated RSA Revisited

Ibrahim Elashry, Yi Mu, Willy Susilo
2013 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications  
Subsequently, in CT-RSA 2003, Ding and Tsudik presented a security proof for these schemes.  ...  In SSYM 2001, Boneh, Ding, Tsudik and Wong presented encryption and signature schemes based on the identity-based mediated RSA (ID-MRSA), in which the users are not allowed to decrypt/sign messages without  ...  Madeleine Strong Cincotta in the final language editing of this paper.  ... 
doi:10.1109/trustcom.2013.88 dblp:conf/trustcom/ElashryMS13 fatcat:lbehfega6nfhrpxhpadx4gdlj4
« Previous Showing results 1 — 15 out of 5,242 results