Results 271 to 280 of about 2,322,677 (316)
Some of the next articles are maybe not open access.
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks
IEEE Security & Privacy, 2020Trusted execution environments (TEEs) enabled research in scenarios where highest-privileged attackers had precise control over systems and microarchitecture. Insights gained from such attacks facilitated the discovery of non-TEE attacks, such as Spectre (as well as Foreshadow from within virtual machines).
Michael Schwarz, Daniel Gruss
openaire +1 more source
GETMBL, 2019
ARM TrustZone [1] is a hardware-based security feature that can provide software with a high-privilege and isolated execution environment. Such isolation is ensured by hardware, which is usually considered as more trustworthy than software.
Wenhao Li, Yubin Xia, Haibo Chen
semanticscholar +1 more source
ARM TrustZone [1] is a hardware-based security feature that can provide software with a high-privilege and isolated execution environment. Such isolation is ensured by hardware, which is usually considered as more trustworthy than software.
Wenhao Li, Yubin Xia, Haibo Chen
semanticscholar +1 more source
Developing a Trusted Stata ADO Repository for Trusted Research Environments
Researchers in the economical, social, and health sciences regularly analyse datasets collected by others. Many of these data are controlled-level, including variables considered to be personal and/or sensitive under data protection and privacy laws (e.g., the European Union’s GDPR).Tyler, Allison, Gyimes, Istvan Laszlo
openaire +1 more source
Federation in a Trusted Research Environment
This presentation was delivered as the closing keynote at the 2025 DataSHIELD conference at the Swiss Institute of Bioinfomatics. It provides a product management perspective on the challenges of data federation, and suggests ways in which integrating data federation frameworks with a trusted research environment could help resolve these.openaire +1 more source
Research on Reputation and Risk Evaluation-Trust for Cloud Environment
Applied Mechanics and Materials, 2014This paper which starts from the characteristics of human social trust relationship, researches the trust in cloud computing environment. At present, the commercial cloud environment exist two main safe problems: one is the cloud platform trust security problems in their own special environment, the second is the security issues on the network of ...
Pei Yin, Xiao Lan Xie, De Jian Zhou
openaire +1 more source
Versatile Trusted Research Environments: An approach for Switzerland
Widespread adoption of versatile Trusted Research Environments (TREs) is essential for conducting research analysis involving sensitive personal data, which plays a pivotal role in advancing research across healthcare, social sciences, and humanities in order to meet societal challenges.Appleton, Owen +11 more
openaire +1 more source
RESEARCH ON ATTRIBUTE-BASED TRUST ELEVATION PROBLEMS IN P2P ENVIRONMENT
International Journal of Pattern Recognition and Artificial Intelligence, 2011Besides security, trust is another key factor affecting resource sharing. The progress and existing problems of trust management related works were analyzed, and several key factors for impacting trust construction were pointed out. Trust management from the aspect of attribute-based recommended trust, trust improvement, trust domain and trust ...
ZHENG-TAO JIANG, DEBIN ZOU, YAO-QIU FENG
openaire +1 more source
Trust and the virtual environment: research and methodological considerations
International Journal of Networking and Virtual Organisations, 2008Trust is a focal construct in management, organisational psychology, marketing, and social science fields. In the Information Systems field, researchers have shown an increasing awareness of how it contributes towards the success of virtual environments.
openaire +1 more source
Enhancing Data Governance in Trusted Research Environments
Trusted Research Environments have been pivotal in facilitating secure and ethical access for research to data deemed too sensitive or detailed to be shared outside of their secure enclaves. The increased availability of these data has facilitated vital research that can benefit our society.openaire +1 more source
Research on trusted Access in edge computing environment
2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ), 2022Zheheng Liang +4 more
openaire +1 more source

