The interconnection of organisations from distributed, heterogeneous, and autonomous domains having different regulations often requires a trusted third-party gateway to translate security means applied in one domain to those of a different domain. At that point, sensitive data is exposed unencrypted on the gateway host, thus vulnerable to attacks. In this paper, we provide a solution to this weakness of federated architectures by using hardware-assisted trusted computing (TC). We propose an approach where the new Intel's CPU extension, namely Software Guard eXtension (SGX), is exploited to guarantee the trustworthiness of the weakest link - i.e., the gateway - in spite of an aggressive attack model. The validation of our work was realised ...
Sensitive data processing occurs more and more on machines or devices out of users control. In the I...
Processing sensitive data, specially medical data produced by body sensors, on third-party untrusted...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Cross-border healthcare requires that secure mechanisms for patient data exchange among distinct eHe...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Networked computer systems underlie a great deal of business, social, and government activity today....
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
International audienceA variety of applications are executing on a large untrusted computing base, w...
International audienceFog and Edge computing provide a large pool of resources at the edge of the ne...
We are living in the time of the digital revolution in which the world we know changes beyond recogn...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
The European Commission is very focused on the development of possible solutions to allow effective ...
The basic technological building blocks of the TCG architecture seem to be stabilizing. As a result,...
Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to v...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
Sensitive data processing occurs more and more on machines or devices out of users control. In the I...
Processing sensitive data, specially medical data produced by body sensors, on third-party untrusted...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Cross-border healthcare requires that secure mechanisms for patient data exchange among distinct eHe...
The need to increase the hostile attack resilience of distributed and internet-worked computer syste...
Networked computer systems underlie a great deal of business, social, and government activity today....
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
International audienceA variety of applications are executing on a large untrusted computing base, w...
International audienceFog and Edge computing provide a large pool of resources at the edge of the ne...
We are living in the time of the digital revolution in which the world we know changes beyond recogn...
Hardware-based trusted computing platforms are intended to overcome many of the problems of trust th...
The European Commission is very focused on the development of possible solutions to allow effective ...
The basic technological building blocks of the TCG architecture seem to be stabilizing. As a result,...
Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to v...
The ever-rising computation demand is forcing the move from the CPU to heterogeneous specialized har...
Sensitive data processing occurs more and more on machines or devices out of users control. In the I...
Processing sensitive data, specially medical data produced by body sensors, on third-party untrusted...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...