메뉴 건너뛰기




Volumn , Issue , 2015, Pages

A first step towards leveraging commodity trusted execution environments for network applications

Author keywords

[No Author keywords available]

Indexed keywords

DESIGN; NETWORK PROTOCOLS; OPEN SOURCE SOFTWARE; PEER TO PEER NETWORKS;

EID: 84962655697     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2834050.2834100     Document Type: Conference Paper
Times cited : (69)

References (39)
  • 7
    • 84923534449 scopus 로고    scopus 로고
    • Shielding applications from an untrusted cloud with haven
    • A. Baumann, M. Peinado, and G. Hunt. Shielding applications from an untrusted cloud with haven. In USENIX OSDI, 2014.
    • (2014) USENIX OSDI
    • Baumann, A.1    Peinado, M.2    Hunt, G.3
  • 10
    • 84951872820 scopus 로고    scopus 로고
    • CTPM: A cloud TPM for cross-device trusted applications
    • C. Chen, H. Raj, S. Saroiu, and A. Wolman. cTPM: A cloud TPM for cross-device trusted applications. In USENIX NSDI, 2014.
    • (2014) USENIX NSDI
    • Chen, C.1    Raj, H.2    Saroiu, S.3    Wolman, A.4
  • 24
    • 55149108173 scopus 로고    scopus 로고
    • Flicker: An execution infrastructure for TCB minimization
    • J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An Execution Infrastructure for TCB Minimization. In EUROSYS, pages 315-328, 2008.
    • (2008) EUROSYS , pp. 315-328
    • McCune, J.M.1    Parno, B.J.2    Perrig, A.3    Reiter, M.K.4    Isozaki, H.5
  • 32
    • 84962273039 scopus 로고    scopus 로고
    • Blindbox: Deep packet inspection over encrypted traffic
    • J. Sherry, C. Lan, R. A. Popa, and S. Ratnasamy. Blindbox: Deep packet inspection over encrypted traffic. In ACM SIGCOMM, 2015.
    • (2015) ACM SIGCOMM
    • Sherry, J.1    Lan, C.2    Popa, R.A.3    Ratnasamy, S.4
  • 36


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.