2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications 2011
DOI: 10.1109/trustcom.2011.13
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Block as a Service: Towards Sensitive Applications on the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Moreover, the loss function of Adaboost will be modified to consider the classification costs. Moreover, we will also investigate the application of the proposed algorithm to information security [41,43,53,42,41,52,18], bioinformatics [40,24,57], medial imaging [56,55,54], computer vision [38,23,22,36,37,19,17,46,44,45,15], reinforcement learning [27,28], cloud computing [50,51] and microprocessor reliability modeling [8,6,7,5,59,61,60].…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, the loss function of Adaboost will be modified to consider the classification costs. Moreover, we will also investigate the application of the proposed algorithm to information security [41,43,53,42,41,52,18], bioinformatics [40,24,57], medial imaging [56,55,54], computer vision [38,23,22,36,37,19,17,46,44,45,15], reinforcement learning [27,28], cloud computing [50,51] and microprocessor reliability modeling [8,6,7,5,59,61,60].…”
Section: Discussionmentioning
confidence: 99%
“…These include cryptography solutions and secure multi-party computation, which has the aim to create methods for parties to ensure a secure collaboration and process information while keeping identities private (Prabhakaran and Sahai, 2013). Hao and Cai (2011) proposed a cloud model to provide “a confidential and verifiable environment for each sensitive application”. Generic technical solutions also exist, such as access controls solutions (Chen et al , 2007; Santos-Pereira et al , 2013) and virus propagation models (Yuan et al , 2009).…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…For example, in (Correia, 2012), a Trusted Virtualization Environment (TVE) has been proposed, leveraging TPM technologies to allow remote users check the software stack of a remote physical machine before deploying their VMs. However, TPMs provide no guarantees when bugs that can cause leakage of confidential information are present in the TCB (Hao and Cai, 2011). In (Keller et al, 2010), NoHype was presented, an architecture where the hypervisor is removed and the VMs have direct control on system resources that are automatically reserved to each of them.…”
Section: Related Workmentioning
confidence: 99%