Responsible Genomic Data Sharing 2020
DOI: 10.1016/b978-0-12-816197-5.00008-5
|View full text |Cite
|
Sign up to set email alerts
|

Trusted execution environment with Intel SGX

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 1 publication
0
7
0
Order By: Relevance
“…An appropriately designed mechanism ensures a desired equilibrium when every worker acts rationally and in its own best interest. Such a mechanism has low complexity and is self-organizing, avoiding the need for Trusted Execution Environments (TEE) [19] or secure multi-party computation, yet makes assumptions about the degree of information available.…”
Section: Incentive Mechanismmentioning
confidence: 99%
“…An appropriately designed mechanism ensures a desired equilibrium when every worker acts rationally and in its own best interest. Such a mechanism has low complexity and is self-organizing, avoiding the need for Trusted Execution Environments (TEE) [19] or secure multi-party computation, yet makes assumptions about the degree of information available.…”
Section: Incentive Mechanismmentioning
confidence: 99%
“…In recent years, Intel deployed SGX technology in their CPUs to help users to build a minimal trusted computing base. It allows users to put sensitive data and codes of the program in a secure container called enclave [18], providing confidentiality and integrity protection. Although SGX technology was once considered the future of trusted execution environments, it fails to solve cache side-channel attacks.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…An appropriately designed mechanism ensures a desired equilibrium when every worker acts rationally and in its own best interest. Such a mechanism has low complexity and is self-organizing, avoiding the need for Trusted Execution Environments [7] or cryptographic schemes. In a FL context, this demands a carefully designed reward strategy based on the quality of contributions.…”
Section: Introductionmentioning
confidence: 99%