Cloud providers offering Software-as-a-Service (SaaS) are increasingly being trusted by customers to store sensitive data. Companies often monetize such personal data through curation and analysis, providing customers with personalized application experiences and targeted advertisements. Personal data is often accompanied by strict privacy and security policies, requiring data processing to be governed by non-trivial enforcement mechanisms. Moreover, to offset the cost of hosting the potentially large amounts of data privately, SaaS companies even employ Infrastructure-as-a-Service (IaaS) cloud providers not under the direct supervision of the administrative entity responsible for the data. Intel Software Guard Extensions (SGX) is a recent ...
This paper addresses the need for secure storage in virtualized services in the cloud. To this purpo...
While the number of connected devices is constantly growing, we observe an increased incident rate o...
A plethora of major security incidents---in which personal identifiers belonging to hundreds of mill...
Cloud computing has become a default choice for data processing by both large corporations and indiv...
Novel trusted execution technologies such as Intel's Software Guard Extensions (SGX) are considered ...
For the past few years, the demand for cloud computing has increased rapidly. Users outsource data p...
Intel SGX has attracted much attention from academia and is already powering commercial applications...
Part 5: Making Things Safe (Security)International audienceThe micro service paradigm targets the im...
In today’s world, cloud machines store an ever-increasing amount of sensitive user data, but it rema...
The micro service paradigm targets the implementation of large and scalable systems while enabling ...
The theoretical construct of a Trusted Third Party (TTP) has the potential to solve many security an...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Increases in data production and growing demands for more computing power leads to the current trend...
Intel announced in September 2013 SGX (Software Guard eXtension) technology to be implemented in the...
This paper addresses the need for secure storage in virtualized services in the cloud. To this purpo...
While the number of connected devices is constantly growing, we observe an increased incident rate o...
A plethora of major security incidents---in which personal identifiers belonging to hundreds of mill...
Cloud computing has become a default choice for data processing by both large corporations and indiv...
Novel trusted execution technologies such as Intel's Software Guard Extensions (SGX) are considered ...
For the past few years, the demand for cloud computing has increased rapidly. Users outsource data p...
Intel SGX has attracted much attention from academia and is already powering commercial applications...
Part 5: Making Things Safe (Security)International audienceThe micro service paradigm targets the im...
In today’s world, cloud machines store an ever-increasing amount of sensitive user data, but it rema...
The micro service paradigm targets the implementation of large and scalable systems while enabling ...
The theoretical construct of a Trusted Third Party (TTP) has the potential to solve many security an...
International audienceA variety of applications are executing on a large untrusted computing base, w...
Intel's Software Guard Extensions (SGX) is a new technology introduced in recent generations of Inte...
Increases in data production and growing demands for more computing power leads to the current trend...
Intel announced in September 2013 SGX (Software Guard eXtension) technology to be implemented in the...
This paper addresses the need for secure storage in virtualized services in the cloud. To this purpo...
While the number of connected devices is constantly growing, we observe an increased incident rate o...
A plethora of major security incidents---in which personal identifiers belonging to hundreds of mill...