Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Bohdan Trach"'
Autor:
Christof Fetzer, Oleksii Oleksenko, Rasha Faqeh, Wojciech Ozga, Pramod Bhatotia, Bohdan Trach
Publikováno v:
Proceedings of the 11th ACM Symposium on Cloud Computing
SoCC
SoCC
A lease is an important primitive for building distributed protocols, and it is ubiquitously employed in distributed systems. However, the scope of the classic lease abstraction is restricted to the trusted computing infrastructure. Unfortunately, th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9d4c60ab0ddbf44d8159adc7089982f9
Publikováno v:
SYSTOR
We introduce Clemmys, a security-first serverless platform that ensures confidentiality and integrity of users' functions and data as they are processed on untrusted cloud premises, while keeping the cost of protection low. We provide a design for ha
Autor:
Bohdan Trach, Robert Krahn, Pramod Bhatotia, Anjo Vahldiek-Oberwagner, Christof Fetzer, Thomas Knauth
Publikováno v:
EuroSys
Proceedings of the EuroSys 2018
Krahn, R, Trach, B, Vahldiek-Oberwagner, A, Knauth, T, Bhatotia, P & Fetzer, C 2018, Pesos: policy enhanced secure object store . in Proceedings of the Thirteenth EuroSys Conference ., 25, Porto, Portugal, Thirteenth EuroSys Conference, Porto, Portugal, 23/04/18 . https://doi.org/10.1145/3190508.3190518
Proceedings of the EuroSys 2018
Krahn, R, Trach, B, Vahldiek-Oberwagner, A, Knauth, T, Bhatotia, P & Fetzer, C 2018, Pesos: policy enhanced secure object store . in Proceedings of the Thirteenth EuroSys Conference ., 25, Porto, Portugal, Thirteenth EuroSys Conference, Porto, Portugal, 23/04/18 . https://doi.org/10.1145/3190508.3190518
Third-party storage services pose the risk of integrity and confidentiality violations as the current storage policy enforcement mechanisms are spread across many layers in the system stack. To mitigate these security vulnerabilities, we present the
Autor:
Christof Fetzer, Pramod Bhatotia, Bohdan Trach, Franz Gregor, Alfred Krohmer, Sergei Arnautov
Publikováno v:
Trach, B, Krohmer, A, Gregor, F, Arnautov, S, Bhatotia, P & Fetzer, C 2018, ShieldBox: Secure Middleboxes using Shielded Execution . in SOSR 2018 : Symposium on SDN Research ., 2, Los Angles, CA, Symposium on SDN Research, Los Angelos, California, United States, 28/03/18 . https://doi.org/10.1145/3185467.3185469
Proceedings of the Symposium on SDN Research-SOSR 18
Proceedings of the Symposium on SDN Research -SOSR '18
SOSR
Proceedings of the Symposium on SDN Research-SOSR 18
Proceedings of the Symposium on SDN Research -SOSR '18
SOSR
Middleboxes that process confidential data cannot be securely deployed in untrusted cloud environments. To securely outsource middleboxes to the cloud, state-of-the-art systems advocate network processing over the encrypted traffic. Unfortunately, th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c348289b3fdcef14f59d95508f8cfb4d
https://www.pure.ed.ac.uk/ws/files/75756036/shieldbox_secure_middleboxes_using_shielded_execution.pdf
https://www.pure.ed.ac.uk/ws/files/75756036/shieldbox_secure_middleboxes_using_shielded_execution.pdf
Publikováno v:
IPDPS
2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)
2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS)
With the spreading of multi-core architectures, operating systems and applications are becoming increasingly more concurrent and their scalability is often limited by the primitives used to synchronize the different hardware threads. In this paper, w
Autor:
Dmitrii Kuvaiskii, Pramod Bhatotia, Sergei Arnautov, Bohdan Trach, Pascal Felber, Christof Fetzer, Oleksii Oleksenko
Publikováno v:
Proceedings of the Twelfth European Conference on Computer Systems-EuroSys 17
Proceedings of the Twelfth European Conference on Computer Systems -EuroSys '17
EuroSys
Proceedings of the Twelfth European Conference on Computer Systems -EuroSys '17
EuroSys
Shielded execution based on Intel SGX provides strong security guarantees for legacy applications running on untrusted platforms. However, memory safety attacks such as Heartbleed can render the confidentiality and integrity properties of shielded ex