A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
In Guards We Trust: Security and Privacy in Operating Systems Revisited
2013
2013 International Conference on Social Computing
The storage guard, the audio filtering guard and the sequencing guard are specifically targeted at providing solutions to three common security and privacy problems in componentbased operating systems. ...
But, not every problem in computer security and privacy could possibly be solved by a trusted micro kernel, because we have higher level security and privacy concepts like packet filtering, data encryption ...
ACKNOWLEDGMENT We would like to thank Alexander Senier for helpful discussions on the storage guard. ...
doi:10.1109/socialcom.2013.87
dblp:conf/socialcom/HanspachK13
fatcat:kuxgjhjhzbe6pegvbz4snwv6g4
Time to Rethink: Trust Brokerage Using Trusted Execution Environments
[chapter]
2015
Lecture Notes in Computer Science
As the assurance and availability of hardware-based Trusted Execution Environments (TEEs) is increasing, we propose an alternative direction of using TEEs as "neutral" environments for efficient yet secure ...
However, currently available de-identification schemes tend to suffer from privacy/utility tradeoffs, and MPC has found deployment only in niche applications. ...
Advancements in Trusted Execution Trusted Execution Environments (TEEs) allow the execution of software in such a way that the main operating system and other "untrusted" software outside the TEE and its ...
doi:10.1007/978-3-319-22846-4_11
fatcat:ixdllo7h7zc6zb3fygbzyba24u
In Law We Trust? Trusted Computing and Legal Responsibility for Internet Security
[chapter]
2009
IFIP Advances in Information and Communication Technology
A possible response is to mirror the shift in power by a shift in legal responsibility, creating new legal liabilities and duties for software companies as the new guardians of internet security. ...
This paper analyses potential legal responses and consequences to the anticipated roll out of Trusted Computing (TC). ...
Proponents state that the implementation and application of technologies that provide TC will increase users' trust in their ability to protect their systems from malicious code and guard their data from ...
doi:10.1007/978-3-642-01244-0_35
fatcat:gq5zm6edoreghhwchgmfy4wfhe
Self-Expiring Data Capsule using Trusted Execution Environment
[article]
2019
arXiv
pre-print
We implement the proposed framework in a system called TEEKAP. ...
Data privacy is unarguably of extreme importance. Nonetheless, there exist various daunting challenges to safe-guarding data privacy. ...
Controlled-channel attacks: Deterministic side
channels for untrusted operating systems. In Security
and Privacy (SP), 2015 IEEE Symposium on, pages
640–656. ...
arXiv:1911.09305v1
fatcat:gun326ntpbhntazceelcnqd6eq
Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities
2019
Security and Communication Networks
This paper revisits the history of improvements to SMC over the years and considers the possibility of coupling trusted hardware with SMC. ...
This paper also addresses three open challenges: (1) defeating malicious adversaries, (2) mobile-friendly TEE-supported SMC, and (3) a more general coupling of trusted hardware and privacy-preserving computation ...
Acknowledgments Special thanks are due to Patrick Traynor and Thomas Shrimpton for their interest in and constructive criticisms of this work. ...
doi:10.1155/2019/1368905
fatcat:izynm6msrvehfa3ghkw7tykk34
Open-TEE -- An Open Virtual Trusted Execution Environment
2015
2015 IEEE Trustcom/BigDataSE/ISPA
Tools and software needed to develop and debug trusted applications may be expensive or non-existent. In this paper, we describe Open-TEE, a virtual, hardware-independent TEE implemented in software. ...
It allows developers to develop and debug trusted applications with the same tools they use for developing software in general. ...
Acknowledgments: We thank the participants of the user study for their time and their useful feedback. Thanks to Kumaripaba Athukorala for advice on conducting the user study. ...
doi:10.1109/trustcom.2015.400
dblp:conf/trustcom/McGillionDNA15
fatcat:saxzddga3rezlcgfltlgpta3ay
Low-Trust Policing in a High-Trust Society - The Norwegian Police Immigration Detention Centre and the Search for Public Sphere Legitimacy
2016
Nordisk Politiforskning
and trust. ...
to overcrowding and the use of poorly trained private security guards. ...
doi:10.18261/issn.1894-8693-2016-02-08
fatcat:pxf72yzwpfacfh52owdp2e5gmm
Decentralized Trusted Computing Base for Blockchain Infrastructure Security
2019
Frontiers in Blockchain
We also thank the numerous colleagues at Intel who have made valuable contributions to trusted computing including Frank McKeen, Claire Vishik, David Grawrock, Vinnie Scarlata, Simon Johnson, David M. ...
We especially want to thank Jennifer E. Koerv for being an advocate and champion of this work. ...
The Trusted Computing Group The TCSEC criteria focused mostly on operating system security. However, the operating system is not the sole TCB component in a platform. ...
doi:10.3389/fbloc.2019.00024
fatcat:zws2jsbi7zecjpmpo2unxz62bq
SoK: Introspections on Trust and the Semantic Gap
2014
2014 IEEE Symposium on Security and Privacy
This paper organizes previous work based on the essential design considerations when building a VMI system, and then explains how these design choices dictate the trust model and security properties of ...
Although this choice is reasonable in some contexts and has facilitated progress, the ultimate goal of reducing the trusted computing base of software systems is best served by a fresh look at the VMI ...
ACKNOWLEDGEMENTS We thank our shepherd, Virgil Gligor, and the anonymous reviewers for their insightful comments on earlier versions of this paper. ...
doi:10.1109/sp.2014.45
dblp:conf/sp/JainBZPS14
fatcat:zpldjgsmcfdvhgx252dewbh33y
Enhancing the security of mobile health monitoring systems through trust negotiations
2011
2011 IEEE 36th Conference on Local Computer Networks
These systems must retain the privacy and the security of the data exchanged. ...
In [21] , privacy and security were differentiated. The study points out that some approaches provided solutions to privacy while others stressed the security of Uhealth system. ...
Appendix A: Setting up the Experiment Basically, we need to install and configure a few things to begin development: • Android SDK • Eclipse • Hex Editor • WampServer
• OpenSSL Android SDK: The Android ...
doi:10.1109/lcn.2011.6115545
dblp:conf/lcn/ElkhodrSC11
fatcat:jdkamb7kdvd6rhqhuw2v6xlx2q
In the face of increasing complexity and frequency of such attacks, we argue that it is insufficient to rely on organizational incident response teams or even trusted coordinating response teams. ...
Based on our approach we present the Palantir system that comprises conceptual and technological capabilities to adequately respond to such attacks. ...
We would like to thank the members of the NCSA Incident Response team, whose efforts in Incident 216 and subsequent discussions led to our understanding of these challenges. ...
doi:10.1145/1527017.1527023
dblp:conf/idtrust/KhuranaBBFWB09
fatcat:c5fjluikrfdwndn6w4zi6nbuqi
Cloud virtual machine lifecycle security framework based on trusted computing
2019
Tsinghua Science and Technology
In this paper, we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats to VMs throughout their entire lifecycle. ...
Then, a trusted computing based security protection framework is developed, which can extend the trusted relationship from trusted platform module to the VM and protect the security and reliability of ...
SCU2018D018 and SCU2018D022). ...
doi:10.26599/tst.2018.9010129
fatcat:g7zeupvllfc7ni3oy5zhu6tmje
Operating System Security
2008
Synthesis Lectures on Information Security Privacy and Trust
He joined Penn State after working for IBM Research for nine years in operating systems and system security research groups. ...
Christoph has taught undergraduate and graduate courses in computer and network security, cryptography, operating systems, and distributed systems at San José ...
revisited. ...
doi:10.2200/s00126ed1v01y200808spt001
fatcat:o7qgtis6zffr3disdujoq4izaa
What the Publisher Can Teach the Patient: Intellectual Property and Privacy in an Era of Trusted Privication
2000
Social Science Research Network
in that system as "trust" when their privacy has not been incorporated into traditional federal privacy frameworks to begin with. ...
A trusted system is one that can be trusted by a rights-holder as against the user of the system-even if the physical system is in the custody of the user. ...
doi:10.2139/ssrn.214468
fatcat:noq34kduojd7nciwqk37pec2ea
Identity-Based Mediated RSA Revisited
2013
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Subsequently, in CT-RSA 2003, Ding and Tsudik presented a security proof for these schemes. ...
In SSYM 2001, Boneh, Ding, Tsudik and Wong presented encryption and signature schemes based on the identity-based mediated RSA (ID-MRSA), in which the users are not allowed to decrypt/sign messages without ...
Madeleine Strong Cincotta in the final language editing of this paper. ...
doi:10.1109/trustcom.2013.88
dblp:conf/trustcom/ElashryMS13
fatcat:lbehfega6nfhrpxhpadx4gdlj4
« Previous
Showing results 1 — 15 out of 5,242 results