2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC) 2018
DOI: 10.1109/cic.2018.00033
|View full text |Cite
|
Sign up to set email alerts
|

Alcatraz: Data Exfiltration-Resilient Corporate Network Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…Therefore, an approach such as a Software Data Diode [72] can be used. The mechanisms to provide the path integrity, packet integrity, and packet confidentiality using commodity hardware (HW) Trusted Execution Environments [73] can also be employed to mitigate the key exposure exfiltration.…”
Section: A Defense For Wallet System Attackmentioning
confidence: 99%
“…Therefore, an approach such as a Software Data Diode [72] can be used. The mechanisms to provide the path integrity, packet integrity, and packet confidentiality using commodity hardware (HW) Trusted Execution Environments [73] can also be employed to mitigate the key exposure exfiltration.…”
Section: A Defense For Wallet System Attackmentioning
confidence: 99%