Results 251 to 260 of about 2,008,551 (307)
Some of the next articles are maybe not open access.
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks
IEEE Security & Privacy, 2020Trusted execution environments (TEEs) enabled research in scenarios where highest-privileged attackers had precise control over systems and microarchitecture. Insights gained from such attacks facilitated the discovery of non-TEE attacks, such as Spectre (as well as Foreshadow from within virtual machines).
Michael Schwarz, Daniel Gruss
openaire +2 more sources
Trusted Research Environment users
2023For Trusted Research Environments (TREs) to be safe, secure, and productive, they must also be usable. In turn, a TRE that is useable minimises barriers to use and provides a productive and accessible analysis environment for research. Ensuring TREs are usable is a core concern of the Standard Architecture for Trusted Research Environments (SATRE ...
O'Donovan, Cian +6 more
openaire +1 more source
Trusted Execution Environments for Telecoms: Strengths, Weaknesses, Opportunities, and Threats
IEEE Security and Privacy, 2023Building on our experience and other experiments, we perform a strengths, weaknesses, opportunities, and threats analysis of x86 platform trusted execution environments (TEEs) in the telecom industry, including recent developments from CPU and cloud ...
M. Lacoste, Vincent Lefebvre
semanticscholar +1 more source
, 2021
BACKGROUND A Trusted Research Environment (also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards) providing access to data for research whilst protecting patient confidentially ...
Sanaz Kavianpour +4 more
semanticscholar +1 more source
BACKGROUND A Trusted Research Environment (also known as a Safe Haven) is an environment supported by trained staff and agreed processes (principles and standards) providing access to data for research whilst protecting patient confidentially ...
Sanaz Kavianpour +4 more
semanticscholar +1 more source
Trusted Research Environments – federating data to complete research
2023This white paper is meant as an input to the discussion on federation of Trusted Research Environments (TREs) within the DARE UK discussion working groups. It aims to establish the purpose for TREs, their required components, and how they will be used by researchers to complete their work.
Barnsley, Peter, Fleming, James
openaire +1 more source
A Comprehensive Analysis of Trusted Execution Environments
Information Technology Trends, 2022The Trusted Execution Environment (TEE) is designed to improve the security of computing environments. TEE is the computational isolation of the application's execution environment from the rest of the computing system.
Osama Hosam, BinYuan Fan
semanticscholar +1 more source
Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem
IEEE Transactions on Information Forensics and Security, 2022The flow of data across nodes has become the dominant feature of data sharing in distributed environments with increasingly blurred boundaries, where it is crucial to maintain data access dynamic, trusted, and efficient.
Haoxiang Huang +4 more
semanticscholar +1 more source
SATRE: Standardised Architecture for Trusted Research Environments
2023The SATRE DARE UK-funded Driver Project was challenged to create a trusted research environment (TRE) architecture supporting the research community's need to have suitable data analytics and research environments for working with sensitive data. The project developed an inclusive and transparent way of working to ensure that what was created was ...
Dr Christian Cole +17 more
openaire +1 more source
ML-DDoS: A Blockchain-Based Multilevel DDoS Mitigation Mechanism for IoT Environments
IEEE transactions on engineering management, 2022Distributed denial of service (DDoS) attacks as well as botnet-based attacks are among the most important security vulnerabilities in Internet of Things (IoT) environments.
Rana Faisal Hayat +4 more
semanticscholar +1 more source
Trust-Oriented Research Methods in Cloud Environment
2013 10th Web Information System and Application Conference, 2013One of the obvious challenges in cloud environments is trust crisis and its influence on the development of cloud computing. This paper analyzes the similarities and differences between cloud computing and other distributed environments, proposes the concept of trust and three different directions of trust-oriented research in cloud environments ...
Yan Wang, Jiantao Zhou
openaire +1 more source

