Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Nico Weichbrodt"'
Publikováno v:
Middleware
Trusted execution as offered by Intel's Software Guard Extensions (SGX) is considered as an enabler to protect the integrity and confidentiality of stateful workloads such as key-value stores and databases in untrusted environments. These systems are
Autor:
Shivananda Neumann, Nico Weichbrodt, Ines Messadi, Lennart Almstedt, Mohammad Mahhouk, Rüdiger Kapitza
Publikováno v:
Middleware
As offered by the Intel Software Guard Extensions (SGX), trusted execution enables confidentiality and integrity for off-site deployed services. Thereby, securing key-value stores has received particular attention, as they are a building block for ma
Publikováno v:
EuroSec@EuroSys
Intel's Software Guard Extensions (SGX) are currently the most wide-spread commodity trusted execution environment, which provides integrity and confidentiality of sensitive code and data. Thereby, it offers protection even against privileged attacke
Publikováno v:
Middleware
The ACM/IFIP/USENIX Middleware conference
Proceedings of the 19th International Middleware Conference on -Middleware '18
Proceedings of the 19th International Middleware Conference on-Middleware 18
The ACM/IFIP/USENIX Middleware conference
Proceedings of the 19th International Middleware Conference on -Middleware '18
Proceedings of the 19th International Middleware Conference on-Middleware 18
Novel trusted execution technologies such as Intel's Software Guard Extensions (SGX) are considered a cure to many security risks in clouds. This is achieved by offering trusted execution contexts, so called enclaves, that enable confidentiality and
Autor:
Vasily A. Sartakov, Thomas Leich, Nico Weichbrodt, Sebastian Krieter, Jacob Krüger, Rüdiger Kapitza
Publikováno v:
ICSE (NIER)
Cloud-based technologies play an increasing role in software engineering because of their scalability, availability, and cost efficiency. However, due to privacy issues, developers and organizations still hesitate to host applications that handle sen
Publikováno v:
IC2E
Intel's novel Software Guard eXtensions (SGX) enable secure and trusted execution of services, thereby paving the way to outsource sensitive data processing to external data centers. While SGX promises trusted execution close to native speed, frequen
Publikováno v:
Computer Security – ESORICS 2016 ISBN: 9783319457437
ESORICS (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Security – ESORICS 2016
21st European Symposium on Research in Computer Security (ESORICS)
21st European Symposium on Research in Somputer Science (ESORICS 2016)
Computer Security – ESORICS 2016
ESORICS (1)
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Computer Security – ESORICS 2016
21st European Symposium on Research in Computer Security (ESORICS)
21st European Symposium on Research in Somputer Science (ESORICS 2016)
Computer Security – ESORICS 2016
Intel’s Software Guard Extensions (SGX) provide a new hardware-based trusted execution environment on Intel CPUs using secure enclaves that are resilient to accesses by privileged code and physical attackers. Originally designed for securing small
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::89d3664e0405f4e87245572fdf9af602
https://doi.org/10.1007/978-3-319-45744-4_22
https://doi.org/10.1007/978-3-319-45744-4_22
Autor:
David Goltzsche, Stefan Brenner, Christof Fetzer, Nico Weichbrodt, Matthias Lorenz, Rüdiger Kapitza, Colin Wulf, Peter Pietzuch
Publikováno v:
ACM/IFIP/USENIX International Conference on Middleware (Middleware), 2016
Proceedings of the 17th ACM Middleware conference (2016)
Middleware
Proceedings of the 17th International Middleware Conference on-Middleware 16
Proceedings of the 17th International Middleware Conference on-Middleware '16
Proceedings of the 17th ACM Middleware conference (2016)
Middleware
Proceedings of the 17th International Middleware Conference on-Middleware 16
Proceedings of the 17th International Middleware Conference on-Middleware '16
Cloud computing, while ubiquitous, still suffers from trust issues, especially for applications managing sensitive data. Third-party coordination services such as ZooKeeper and Consul are fundamental building blocks for cloud applications, but are ex
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3f4159e281b2e33a76e524f62e423971
Autor:
Nico Weichbrodt, Tobias Distler, Bijun Li, Johannes Behl, Rüdiger Kapitza, Pierre-Louis Aublin
Publikováno v:
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
DSN
DSN
Various protocols and architectures have been proposed to make Byzantine fault tolerance (BFT) increasingly practical. However, the deployment of such systems requires dedicated client-side functionality. This is necessary as clients have to connect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c2a7220149346c5e8044b0f0a744c960
Autor:
Christof Fetzer, Signe Rusch, Manuel Nieke, Paolo Cosa, Pierre-Louis Aublin, Valerio Schiavoni, Rüdiger Kapitza, Nico Weichbrodt, Pascal Felber, Sébastien Vaucher, Peter Pietzuch, David Goltzsche
Publikováno v:
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
The definitive version is published in the proceedings of the 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’18)
DSN
The definitive version is published in the proceedings of the 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’18)
DSN
Many organisations enhance the performance, security, and functionality of their managed networks by deploying middleboxes centrally as part of their core network. While this simplifies maintenance, it also increases cost because middlebox hardware m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::24ba1f1bccccbd844c4993f6f026dfb2