Proceedings of the 4th Workshop on System Software for Trusted Execution 2019
DOI: 10.1145/3342559.3365335
|View full text |Cite
|
Sign up to set email alerts
|

Toward scaling hardware security module for emerging cloud services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…HSMs can be used to protect keys used by certificate authorities, banks, and cryptocurrency wallets. They are present within vehicles [69], operational technology [32], and clouds [31]. HSMs act as trusted security anchors and gateway to the network.…”
Section: Related Workmentioning
confidence: 99%
“…HSMs can be used to protect keys used by certificate authorities, banks, and cryptocurrency wallets. They are present within vehicles [69], operational technology [32], and clouds [31]. HSMs act as trusted security anchors and gateway to the network.…”
Section: Related Workmentioning
confidence: 99%
“…HSMs fulfill a very important role as the root of trust in systems where they are applied. In fact, HSMs are used in different fields; for example, in PKIs [22], network protocols [23], database encryption [24], digital signatures [25], and cloud services [26].…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, this approach lacks standardization, as it is specifically tailored to work only with SharePoint servers, limiting its applicability and flexibility in diverse server environments. Another strategy involves the use of "Module-OT", a hardware security module (HSM) developed by the National Renewable Energy Laboratory (NREL) to secure communication between distributed energy resource systems [26]. HSMs are tamper-resistant hardware devices that facilitate end-to-end encryption, authentication, and authorization by generating cryptographic keys and X.509 certificates and performing various cryptographic and certificate management operations.…”
mentioning
confidence: 99%