Results 21 to 30 of about 115,293 (296)

A Privacy-Preserving Scheme for Smart Grid Using Trusted Execution Environment

open access: yesIEEE Access, 2023
The increasing transformation from the legacy power grid to the smart grid brings new opportunities and challenges to power system operations. Bidirectional communications between home-area devices and the distribution system empower smart grid ...
Mete Akgun   +2 more
doaj   +1 more source

SofTEE: Software-Based Trusted Execution Environment for User Applications

open access: yesIEEE Access, 2020
Commodity operating systems are considered vulnerable. Therefore, when an application handles security-sensitive data, it is highly recommended to run the application in a trusted execution environment.
Unsung Lee, Chanik Park
doaj   +1 more source

Blockchain based trusted execution environment architecture analysis for multi - source data fusion scenario

open access: yesJournal of Cloud Computing: Advances, Systems and Applications, 2023
Multi-source data fusion techniques are widely applied in dynamic target detection scenarios, such as target situational awareness, radar signal resolution, and feature fusion labeling.
Nan Yang   +5 more
doaj   +1 more source

Trust-DETM: Distributed Energy Trading Model Based on Trusted Execution Environment

open access: yesMathematics, 2023
The traditional centralized power trading model suffers from high maintenance costs, low processing efficiency and unsynchronized information, and it cannot adapt to the high-frequency and small-dollar distributed energy trading scenario.
Xin Lu, Hongchen Guo
doaj   +1 more source

The possibilities of implementing real-time programming code secured execution environments on GNU/LINUX operating systems

open access: yesБезопасность информационных технологий, 2023
The relevance of the present study is confirmed by the need for implementing technologies of program code, controlled execution for general-purpose systems and for systems, which are used in critical information infrastructure (CII).
Aleksandr G. Burtsev   +2 more
doaj   +1 more source

Quick Boot of Trusted Execution Environment With Hardware Accelerators

open access: yesIEEE Access, 2020
The Trusted Execution Environment (TEE) offers a software platform for secure applications. The TEE offers a memory isolation scheme and software authentication from a high privilege mode.
Trong-Thuc Hoang   +6 more
doaj   +1 more source

Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling

open access: yesIEEE Access, 2022
A Trusted Execution Environment (TEE) sets a platform to secure applications based on the Chain-of-Trust (CoT). The starting point of the CoT is called the Root-of-Trust (RoT). However, the RoT implementation often relies on obscurity and provides little
Trong-Thuc Hoang   +7 more
doaj   +1 more source

Attestation Mechanisms for Trusted Execution Environments Demystified

open access: yes, 2022
Attestation is a fundamental building block to establish trust over software systems. When used in conjunction with trusted execution environments, it guarantees the genuineness of the code executed against powerful attackers and threats, paving the way for adoption in several sensitive application domains.
Jämes Ménétrey   +6 more
openaire   +2 more sources

Trusted Execution Environment: What It is, and What It is Not [PDF]

open access: yes2015 IEEE Trustcom/BigDataSE/ISPA, 2015
Nowadays, there is a trend to design complex, yet secure systems. In this context, the Trusted Execution Environment (TEE) was designed to enrich the previously defined trusted platforms. TEE is commonly known as an isolated processing environment in which applications can be securely executed irrespective of the rest of the system.
Abdelmadjid Bouabdallah   +2 more
openaire   +1 more source

A Novel Auction Blockchain System with Price Recommendation and Trusted Execution Environment

open access: yesMathematics, 2021
Online auctions are now widely used, with all the convenience and efficiency brought by internet technology. Despite the advantages over traditional auction methods, some challenges still remain in online auctions.
Dong-Her Shih   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy