Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge

C Correia, M Correia, L Rodrigues - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
In this paper we propose a novel abstraction that we have named Range-Revocable
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …

Using Range-Revocable Pseudonyms to Provide Backward Unlinkability in the Edge (Extended Version)

C Correia, M Correia, L Rodrigues - arXiv preprint arXiv:2308.03402, 2023 - arxiv.org
In this paper we propose a novel abstraction that we have named Range-Revocable
Pseudonyms (RRPs). RRPs are a new class of pseudonyms whose validity can be revoked …

Delegating verification for remote attestation using tee

T Yagawa, T Teruya, K Suzaki… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
Remote Attestation (RA) can check the status of target IoT devices and cloud platforms from
remote locations. In RA, a user is presented with evidence by the target to evaluate its status …

Comprehensive Analysis of Access Control Models in Edge Computing: Challenges, Solutions, and Future Directions

T Xue, Y Zhang, H Zhang - arXiv preprint arXiv:2405.07685, 2024 - arxiv.org
Many contemporary applications, including smart homes and autonomous vehicles, rely on
the Internet of Things technology. While cloud computing provides a multitude of valuable …

Encloak: Protecting Sensitive Data in Remote Computing Using Trusted Execution Environments

Y Wang - Available at SSRN 5106164 - papers.ssrn.com
In this paper, we propose EnCloak, an automatic robust security framework for protecting
data confidentiality and integrity of Java programs in the untrusted cloud runtime en …

[引用][C] Low-Latency Privacy-Preserving Access to Edge Storage

CJP Correia - 2024 - INSTITUTO SUPERIOR TECNICO