Results 271 to 280 of about 2,322,677 (316)
Some of the next articles are maybe not open access.

How Trusted Execution Environments Fuel Research on Microarchitectural Attacks

IEEE Security & Privacy, 2020
Trusted execution environments (TEEs) enabled research in scenarios where highest-privileged attackers had precise control over systems and microarchitecture. Insights gained from such attacks facilitated the discovery of non-TEE attacks, such as Spectre (as well as Foreshadow from within virtual machines).
Michael Schwarz, Daniel Gruss
openaire   +1 more source

Research on ARM TrustZone

GETMBL, 2019
ARM TrustZone [1] is a hardware-based security feature that can provide software with a high-privilege and isolated execution environment. Such isolation is ensured by hardware, which is usually considered as more trustworthy than software.
Wenhao Li, Yubin Xia, Haibo Chen
semanticscholar   +1 more source

Developing a Trusted Stata ADO Repository for Trusted Research Environments

Researchers in the economical, social, and health sciences regularly analyse datasets collected by others. Many of these data are controlled-level, including variables considered to be personal and/or sensitive under data protection and privacy laws (e.g., the European Union’s GDPR).
Tyler, Allison, Gyimes, Istvan Laszlo
openaire   +1 more source

Federation in a Trusted Research Environment

This presentation was delivered as the closing keynote at the 2025 DataSHIELD conference at the Swiss Institute of Bioinfomatics.  It provides a product management perspective on the challenges of data federation, and suggests ways in which integrating data federation frameworks with a trusted research environment could help resolve these.
openaire   +1 more source

Research on Reputation and Risk Evaluation-Trust for Cloud Environment

Applied Mechanics and Materials, 2014
This paper which starts from the characteristics of human social trust relationship, researches the trust in cloud computing environment. At present, the commercial cloud environment exist two main safe problems: one is the cloud platform trust security problems in their own special environment, the second is the security issues on the network of ...
Pei Yin, Xiao Lan Xie, De Jian Zhou
openaire   +1 more source

Versatile Trusted Research Environments: An approach for Switzerland

Widespread adoption of versatile Trusted Research Environments (TREs) is essential for conducting research analysis involving sensitive personal data, which plays a pivotal role in advancing research across healthcare, social sciences, and humanities in order to meet societal challenges.
Appleton, Owen   +11 more
openaire   +1 more source

RESEARCH ON ATTRIBUTE-BASED TRUST ELEVATION PROBLEMS IN P2P ENVIRONMENT

International Journal of Pattern Recognition and Artificial Intelligence, 2011
Besides security, trust is another key factor affecting resource sharing. The progress and existing problems of trust management related works were analyzed, and several key factors for impacting trust construction were pointed out. Trust management from the aspect of attribute-based recommended trust, trust improvement, trust domain and trust ...
ZHENG-TAO JIANG, DEBIN ZOU, YAO-QIU FENG
openaire   +1 more source

Trust and the virtual environment: research and methodological considerations

International Journal of Networking and Virtual Organisations, 2008
Trust is a focal construct in management, organisational psychology, marketing, and social science fields. In the Information Systems field, researchers have shown an increasing awareness of how it contributes towards the success of virtual environments.
openaire   +1 more source

Enhancing Data Governance in Trusted Research Environments

Trusted Research Environments have been pivotal in facilitating secure and ethical access for research to data deemed too sensitive or detailed to be shared outside of their secure enclaves. The increased availability of these data has facilitated vital research that can benefit our society.
openaire   +1 more source

Research on trusted Access in edge computing environment

2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ), 2022
Zheheng Liang   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy