Results 11 to 20 of about 124,809 (301)

Open Virtual Trusted Execution Environment [PDF]

open access: yes2015 IEEE Trustcom/BigDataSE/ISPA, 2016
Hardware-based Trusted Execution Environments (TEEs) are widely deployed in mobile devices. Yet their use has been limited primarily to applications developed by the device vendors. Recent standardization of TEE interfaces by GlobalPlatform (GP) promises to partially address this problem by enabling GP-compliant trusted applications to run on TEEs from
McGillion, Brian   +4 more
core   +6 more sources

Distributed Privacy Protection Data Search Scheme [PDF]

open access: yesJisuanji kexue, 2022
Aiming at the problem of data island caused by high-sensitivity data in the cloud,which makes the data unable to search,discover and share with each other,a distributed privacy protection data search scheme is proposed to realize the two-way ...
LIU Ming-da, SHI Yi-juan, RAO Xiang, FAN Lei
doaj   +1 more source

MeetGo: A Trusted Execution Environment for Remote Applications on FPGA

open access: yesIEEE Access, 2021
Remote computing has emerged as a trendy computing model that enables users to process an immense number of computations efficiently on the remote server where the necessary data and high-performance computing power are provisioned.
Hyunyoung Oh   +4 more
doaj   +1 more source

Profiling with Trust: System Monitoring from Trusted Execution Environments

open access: yesDesign Automation for Embedded Systems, 2023
Abstract Large-scale attacks on IoT and edge computing devices pose a significant threat. As a prominent example, Mirai is an IoT botnet with 600,000 infected devices around the globe, capable of conducting effective and targeted DDoS attacks on (critical) infrastructure.
Eichler, Christian   +5 more
openaire   +2 more sources

A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment

open access: yesIEEE Access, 2023
The increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid ...
Mete Akgun   +2 more
doaj   +1 more source

Application progress of SGX in trusted computing area

open access: yes网络与信息安全学报, 2021
The trusted computing technology SGX protects the confidentiality and integrity of key codes and data by isolating a trusted execution environment, which can help prevent all kinds of attacks.Firstly, the research background and working principle of SGX ...
Bo ZHAO, Anqi YUAN, Yang AN
doaj   +3 more sources

SofTEE: Software-Based Trusted Execution Environment for User Applications

open access: yesIEEE Access, 2020
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment.
Unsung Lee, Chanik Park
doaj   +1 more source

Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
Multi-source data fusion techniques are widely applied in dynamic target detection scenarios, such as target situational awareness, radar signal resolution, and feature fusion labeling.
Nan Yang   +5 more
doaj   +1 more source

The possibilities of implementing real-time programming code secured execution environments on GNU/LINUX operating systems

open access: yesБезопасность информационных технологий, 2023
The relevance of the present study is confirmed by the need for implementing technologies of program code, controlled execution for general-purpose systems and for systems, which are used in critical information infrastructure (CII).
Aleksandr G. Burtsev   +2 more
doaj   +1 more source

Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling

open access: yesIEEE Access, 2022
A Trusted Execution Environment (TEE) sets a platform to secure applications based on the Chain-of-Trust (CoT). The starting point of the CoT is called the Root-of-Trust (RoT). However, the RoT implementation often relies on obscurity and provides little
Trong-Thuc Hoang   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy