• Aucun résultat trouvé

Trusted Execution Environments

Distributed systems and trusted execution environments : trade-offs and challenges

Distributed systems and trusted execution environments : trade-offs and challenges

... of trusted execution environments (TEEs) by designing, implementing and evaluating systems that naturally fit into cloud deployment scenarios, where many potential threats are possible (see Chapter ...

133

Personal Database Security and Trusted Execution Environments: A Tutorial at the Crossroads

Personal Database Security and Trusted Execution Environments: A Tutorial at the Crossroads

... France guillaume.scerri@uvsq.fr ABSTRACT Smart disclosure initiatives and new regulations such as GDPR in the EU increase the interest for Personal Data Management Systems (PDMS) being provided to individuals to preserve ...

5

Comparison of side-channel leakage on Rich and Trusted Execution Environments

Comparison of side-channel leakage on Rich and Trusted Execution Environments

... cryptions were hard to distinguish. Moreover, the timing variability of the TA execution induced by the switch context between Normal World and Se- cure World increases the difficulty of resynchroni- sation. ...

8

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

... In order to overcome the aforementioned problem, we leverage the fact that using the TEE mechanisms and attestation, one can rely on checks made within other participant’s TEEs. In our architecture, the foundation of ...

14

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

... honest execution of q i over p i ’s PDMS remains however under the participant’s responsibility who selected it to protect his personal ...global execution of ...

14

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

Trustworthy Distributed Computations on Personal Data Using Trusted Execution Environments

... honest execution of q i over p i ’s PDMS remains however under the participant’s responsibility who selected it to protect his personal ...global execution of ...

14

Trusted Access Control System for Smart Campus

Trusted Access Control System for Smart Campus

... user authenticated or not. At this point the two users are able to communicate and to encrypt/decrypt messages. This Key extraction step is the main difference between Callas and the previous IBE schemes as it induces a ...

8

A Card-less TEE-Based Solution for Trusted Access Control

A Card-less TEE-Based Solution for Trusted Access Control

... Control, Trusted Execution Environments (TEE), Identity Based Encryption, ...on Trusted Execution Environment (TEE) in the cloud and Identity Based Encryption (IBE) ...

7

Trusted mobile computing: An overview of existing solutions

Trusted mobile computing: An overview of existing solutions

... Elements, Trusted Platform Module and Trusted Execution Environments) and software-based solutions (Virtualization ...of trusted computing applications are then provided for each ...for ...

18

Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers

Secure Distributed Computing on Untrusted Fog Infrastructures Using Trusted Linux Containers

... the execution of distributed ...isolated execution can- not be guaranteed because security mechanisms are implemented in the operating system of remote hosts and managed by untrusted host ...the ...

8

A Trusted Lightweight Synchronisation Protocol for Wireless Ad-hoc Networks

A Trusted Lightweight Synchronisation Protocol for Wireless Ad-hoc Networks

... Security and reliability are key parameters of WSN. Our approach is to use trust aspects to improve every aspects and deal with this problem. The trust management is social control mechanism which enable deviant ...

7

Observations from Inside on Execution Day

Observations from Inside on Execution Day

... Amusing Ourselves to Death: Public Discourse in the Age of Show Business. The Journal of Politics[r] ...

5

Lyee Program Execution Patterns

Lyee Program Execution Patterns

... 3 aims at verifying the conditions under which the determination of output words is possible. Each pallet function controls the program execution thanks to its related vectors. It shall be noticed that the ...

14

Concepts Extraction from Execution Traces

Concepts Extraction from Execution Traces

... and–or execution traces, ...the execution phases invoked in a ...understand execution traces by identifying the relations between execution trace ...

132

The design and evaluation of a virtual trusted advisor

The design and evaluation of a virtual trusted advisor

... In our simulation, each user's response is generated from a designated "profile". Each profile represents a true unmet need. For example, Profile 1 in our simulation [r] ...

62

Privacy Preserving Record Matching Using Automated Semi-trusted Broker

Privacy Preserving Record Matching Using Automated Semi-trusted Broker

... Not much work has been done in this area of privacy preserving record linkage in dynamic setting. Some existing techniques that partially address the problem require encryption of linkage information using a shared key ...

17

Towards trusted and secure communications in a vehicular environment

Towards trusted and secure communications in a vehicular environment

... Guan Yong Liang, Associate Professor, Nanyang Technological University Examinateur. TELECOM ParisTech[r] ...

250

Dynamic Execution Platforms over Federated Clouds

Dynamic Execution Platforms over Federated Clouds

... elastic execution platforms over federations of multiple cloud infras- tructures, and that these execution platforms can be efficiently migrated between multiple cloud infrastructures, making them more ...

153

Trusted Collaborative Real Time Scheduling in a Smart Card Exokernel

Trusted Collaborative Real Time Scheduling in a Smart Card Exokernel

... 4 Deville & Rippert & Grimaud 2 Working context 2.1 Smart cards Smart cards are small, portable and secured devices characterized by the very strict hardware constraints they impose to operating system ...

19

Hardware-Assisted Program Execution Integrity: HAPEI

Hardware-Assisted Program Execution Integrity: HAPEI

... Contribution This work proposes HAPEI to ensure that the intended software is what is actually running on the chip. Inspired by SOFIA [13], the solution is a hardware Instruction Set Randomization (ISR) scheme that ...

16

Show all 990 documents...

Sujets connexes