Enabling rack-scale confidential computing using heterogeneous trusted execution environment

J Zhu, R Hou, XF Wang, W Wang, J Cao… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
With its huge real-world demands, large-scale confidential computing still cannot be
supported by today's Trusted Execution Environment (TEE), due to the lack of scalable and …

Aion: Enabling open systems through strong availability guarantees for enclaves

F Alder, J Van Bulck, F Piessens… - Proceedings of the 2021 …, 2021 - dl.acm.org
Embedded Trusted Execution Environments (TEEs) can provide strong security for software
in the IoT or in critical control systems. Approaches to combine this security with real-time …

Enabling privacy-preserving, compute-and data-intensive computing using heterogeneous trusted execution environment

J Zhu, R Hou, XF Wang, W Wang, J Cao, L Zhao… - arXiv preprint arXiv …, 2019 - arxiv.org
There is an urgent demand for privacy-preserving techniques capable of supporting
compute and data intensive (CDI) computing in the era of big data. However, none of …

Mitigator: Privacy policy compliance using trusted hardware

M Mazmudar, I Goldberg - Proceedings on Privacy Enhancing …, 2020 - petsymposium.org
Through recent years, much research has been conducted into processing privacy policies
and presenting them in ways that are easy for users to understand. However, understanding …

Secure brokered delegation through delegaTEE

M Schneider, S Matetic, A Juels, A Miller… - IEEE Security & …, 2019 - ieeexplore.ieee.org
Secure Brokered Delegation Through DelegaTEE Page 1 1540-7993/19©2019IEEE
Copublished by the IEEE Computer and Reliability Societies July/August 2019 43 Secure …

Mitigator: Privacy policy compliance using Intel SGX

M Mazmudar - 2019 - uwspace.uwaterloo.ca
Privacy policies have been known to be hard to read and understand by internet users and
yet users are obliged to accept these one-sided terms of usage of their data before they can …

User-Controlled Computations in Untrusted Computing Environments

D Vinayagamurthy - 2019 - uwspace.uwaterloo.ca
Computing infrastructures are challenging and expensive to maintain. This led to the growth
of cloud computing with users renting computing resources from centralized cloud providers …