Zobrazeno 1 - 10
of 29
pro vyhledávání: '"Do, Le Quoc"'
Autor:
Salami, B., Parasyris, K., Cristal, A., Unsal, O., Martorell, X., Carpenter, P., De La Cruz, R., Bautista, L., Jimenez, D., Alvarez, C., Nabavi, S., Madonar, S., Pericas, M., Trancoso, P., Abduljabbar, M., Chen, J., Soomro, P. N., Manivannan, M, Berge, M., Krupop, S., Klawonn, F., Mekhlafi, Al, May, S., Becker, T., Gaydadjiev, G., Odman, D., Salomonsson, H., Dubhashi, D., Port, O., Etsion, Y., Do, Le Quoc, Fetzer, Christof, Kaiser, M., Kucza, N., Hagemeyer, J., Griessl, R., Tigges, L., Mika, K., Huffmeier, A., Jungeblu, Th., Pasin, M., Schiavoni, V., Rocha, I., Gottel, C., Felber, P.
The LEGaTO project leverages task-based programming models to provide a software ecosystem for Made in-Europe heterogeneous hardware composed of CPUs, GPUs, FPGAs and dataflow engines. The aim is to attain one order of magnitude energy savings from t
Externí odkaz:
http://arxiv.org/abs/1912.01563
Autor:
Alves de Oliveira, Ana Cristina, Aurélio Spohn, Marco, Fetzer, Christof, Do, Le Quoc, Martin, André
Publikováno v:
Journal of Universal Computer Science (JUCS); 2023, Vol. 29 Issue 12, p1461-1481, 21p
Publikováno v:
Queue. 18:78-114
Trusted Execution Environments ('TEEs') or 'secure enclaves' aim at enabling more secure computation and data management. There is much enthusiasm for this technology, not least as we see increasing legal and regulatory attention on issues of securit
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
ACM/SIGAPP Symposium on Applied Computing
Publikováno v:
CLOUD
Trust is of paramount concern for tenants to deploy their security-sensitive services in the cloud. The integrity of virtual machines (VMs) in which these services are deployed needs to be ensured even in the presence of powerful adversaries with adm
Publikováno v:
Data and Applications Security and Privacy XXXV ISBN: 9783030812416
DBSec
IFIP Annual Conference on Data and Applications Security and Privacy
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Data and Applications Security and Privacy XXXV
DBSec
IFIP Annual Conference on Data and Applications Security and Privacy
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Data and Applications Security and Privacy XXXV
Confidential multi-stakeholder machine learning (ML) allows multiple parties to perform collaborative data analytics while not revealing their intellectual property, such as ML source code, model, or datasets. State-of-the-art solutions based on homo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::db46cf5ef0e80fbea9bbc81b2fee88c8
https://doi.org/10.1007/978-3-030-81242-3_11
https://doi.org/10.1007/978-3-030-81242-3_11
Autor:
Pascal Felber, Andrey Brito, Donald Dragoti, Robert Krahn, Do Le Quoc, Franz Gregor, Valerio Schiavoni, Clenimar Souza, Christof Fetzer
Publikováno v:
Proceedings of the 21st International Middleware Conference
Middleware
Middleware
Trusted Execution Environments (TEEs), such as Intel Software Guard eXtensions (SGX), are considered as a promising approach to resolve security challenges in clouds. TEEs protect the confidentiality and integrity of application code and data even ag
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3faa70009c3646a9b181189c9a232fc9
http://arxiv.org/abs/2012.06554
http://arxiv.org/abs/2012.06554
Publikováno v:
Proceedings of the 21st International Middleware Conference
Trusted computing defines how to securely measure, store, and verify the integrity of software controlling a computer. One of the major challenges that make them hard to be applied in practice is the issue with software updates. Specifically, an oper