2021
DOI: 10.1145/3457191
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthy scientific computing

Abstract: Addressing the trust issues underlying the current limits on data sharing.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Trusted Execution Environments (TEE) or secure enclaves isolate, and with some technologies encrypt, the data in memory during the processing process. There are different approaches, supported by different hardware solutions [6]. ARM TrustZone isolates the critical security firmware, assets, and private information from the rest of the applications while using the full processing power of the main cores.…”
Section: Trusted Execution Environmentsmentioning
confidence: 99%
“…Trusted Execution Environments (TEE) or secure enclaves isolate, and with some technologies encrypt, the data in memory during the processing process. There are different approaches, supported by different hardware solutions [6]. ARM TrustZone isolates the critical security firmware, assets, and private information from the rest of the applications while using the full processing power of the main cores.…”
Section: Trusted Execution Environmentsmentioning
confidence: 99%