Intel software guard extensions applications: A survey
NC Will, CA Maziero - ACM Computing Surveys, 2023 - dl.acm.org
Data confidentiality is a central concern in modern computer systems and services, as
sensitive data from users and companies are being increasingly delegated to such systems …
sensitive data from users and companies are being increasingly delegated to such systems …
Scalable memory protection in the {PENGLAI} enclave
Secure hardware enclaves have been widely used for protecting security-critical
applications in the cloud. However, existing enclave designs fail to meet the requirements of …
applications in the cloud. However, existing enclave designs fail to meet the requirements of …
Adore: Differentially oblivious relational database operators
There has been a recent effort in applying differential privacy on memory access patterns to
enhance data privacy. This is called differential obliviousness. Differential obliviousness is a …
enhance data privacy. This is called differential obliviousness. Differential obliviousness is a …
Bringing decentralized search to decentralized services
This paper addresses a key missing piece in the current ecosystem of decentralized
services and blockchain apps: the lack of decentralized, verifiable, and private search …
services and blockchain apps: the lack of decentralized, verifiable, and private search …
Towards practical oblivious join
Many individuals and companies choose the public cloud as their data and IT infrastructure
platform. But remote accesses over the data inevitably bring the issue of trust. Despite strong …
platform. But remote accesses over the data inevitably bring the issue of trust. Despite strong …
Distributed ledger technology and fully homomorphic encryption: Next-generation information-sharing for supply chain efficiency
DP Hellwig, A Huchzermeier - Innovative Technology at the Interface of …, 2022 - Springer
Abstract Information-sharing facilitates the coordination of supply chains and can be
essential for enterprises' survival. Studies have shown that supply chains benefit from the …
essential for enterprises' survival. Studies have shown that supply chains benefit from the …
DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy Aggregation
Federated learning (FL) relies on a central authority to oversee and aggregate model
updates contributed by multiple participating parties in the training process. This …
updates contributed by multiple participating parties in the training process. This …
Data station: delegated, trustworthy, and auditable computation to enable data-sharing consortia with a data escrow
Pooling and sharing data increases and distributes its value. But since data cannot be
revoked once shared, scenarios that require controlled release of data for regulatory …
revoked once shared, scenarios that require controlled release of data for regulatory …
Accelerating Extra Dimensional Page Walks for Confidential Computing
To support highly scalable and fine-grained computing paradigms such as microservices
and serverless computing better, modern hardware-assisted confidential computing …
and serverless computing better, modern hardware-assisted confidential computing …
Authenticable data analytics over encrypted data in the cloud
Statistical analytics on encrypted data requires a fully-homomorphic encryption (FHE)
scheme. However, heavy computation overheads make FHE impractical. In this paper we …
scheme. However, heavy computation overheads make FHE impractical. In this paper we …