Keystone: An open framework for architecting trusted execution environments

D Lee, D Kohlbrenner, S Shinde, K Asanović… - Proceedings of the …, 2020 - dl.acm.org
Trusted execution environments (TEEs) see rising use in devices from embedded sensors to
cloud servers and encompass a range of cost, power constraints, and security threat model …

Nexus: Practical and secure access control on untrusted storage platforms using client-side sgx

JB Djoko, J Lange, AJ Lee - 2019 49th Annual IEEE/IFIP …, 2019 - ieeexplore.ieee.org
With the rising popularity of file-sharing services such as Google Drive and Dropbox in the
workflows of individuals and corporations alike, the protection of client-outsourced data from …

Jupiter: a modern federated learning platform for regional medical care

J Xing, J Tian, Z Jiang, J Cheng, H Yin - Science China Information …, 2021 - Springer
With the emergence of AI technologies, intrinsic value of data is released and takes
tremendous effects on numerous industries. In the context of regional medical care, data …

Senfuzzer: Detecting sgx memory corruption via information feedback and tailored interface analysis

D Yu, J Wang, H Fang, Y Fang, Y Zhang - Proceedings of the 26th …, 2023 - dl.acm.org
Intel SGX provides protected memory called enclave to secure the private user data against
corrupted or malicious OS environment. However, several researches have shown that the …

Secure group file sharing

B Fuhry, L Hirschoff, F Kerschbaum - US Patent 11,546,341, 2023 - Google Patents
Aspects of the current subject matter are directed to secure group file sharing. An
architecture for end-to-end encrypted, group-based file sharing using a trusted execution …

Towards Practical Access Control and Usage Control on the Cloud Using Trusted Hardware

JB Djoko - 2019 - search.proquest.com
Today, cloud-based file sharing platforms are amongst the most popular services on the
Internet. For instance, mainstream file sharing services already boast hundreds of millions in …

[PDF][PDF] Protecting Applications Using Trusted Execution Environments

C Priebe - 2020 - core.ac.uk
While cloud computing has been broadly adopted, companies that deal with sensitive data
are still reluctant to do so due to privacy concerns or legal restrictions. Vulnerabilities in …

MooseGuard: secure file sharing at scale in untrusted environments

J Baker - 2020 - d-scholarship.pitt.edu
Shared storage systems provide cheap, scalable, and reliable storage, but secure sharing in
these systems requires users to encrypt their data and limit efficient sharing or trust a service …

Towards Practical Access Control and Usage Control on the Cloud using Trusted Hardware

JB Djoko Takougue - 2020 - d-scholarship.pitt.edu
Cloud-based platforms have become the principle way to store, share, and synchronize files
online. For individuals and organizations alike, cloud storage not only provides resource …