Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516678
|View full text |Cite
|
Sign up to set email alerts
|

Oasis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 40 publications
(7 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…Every bitcoin or different crypto currency dealing is given a blockchain record that's available to the general public. Additionally, individual users might synchronize their computers with a speci c block chain, receiving updates as new transactions happen [11,12,13,14,15]. Bitcoin, Ethereum, and other public blockchains are well-known and self-explanatory.…”
Section: Transactional Info Like the Date Time And Quantity Of A Salementioning
confidence: 99%
“…Every bitcoin or different crypto currency dealing is given a blockchain record that's available to the general public. Additionally, individual users might synchronize their computers with a speci c block chain, receiving updates as new transactions happen [11,12,13,14,15]. Bitcoin, Ethereum, and other public blockchains are well-known and self-explanatory.…”
Section: Transactional Info Like the Date Time And Quantity Of A Salementioning
confidence: 99%
“…Several systems combine hardware-based isolation [37], [46], [59] with trusted system software [17], [28], [36], [38], [54], [58], [69], which is typically a trusted hypervisor. The Flicker [39] approach uses TXT [31] and avoids using a trusted hypervisor by time-partitioning the host machine between trusted and untrusted operation.…”
Section: Related Workmentioning
confidence: 99%
“…We implemented VC3 for the popular Hadoop distribution HDInsight on the Windows operating system. Our implementation is based on the new hardware security mechanisms of Intel SGX, but it could in principle target other secure computing technologies [46]. Experimental results on common benchmarks show that VC3 performs well compared with unprotected Hadoop; VC3's average runtime overhead is negligible for its base security guarantees, 4.5% with write integrity and 8% with read/write integrity.…”
Section: Introductionmentioning
confidence: 99%
“…The architecture relies on new processor extensions and a hardware-based virtualized TPM to support multiple, concurrent, dynamic root-of-trust requests from different VMs. [Owusu et al 2013] propose a new a set of CPU instruction set extension for externally verifiable initiation and execution of an isolated execution environment.…”
Section: 34mentioning
confidence: 99%
“…When access is restricted to trusted staff, i.e., this includes the case in which physical security systems in the Cloud premises are in place (such as cameras, security personel, etc) [Azab et al 2010] [Szefer et al 2011], versus those in which attackers may have physical access to the system [Owusu et al 2013]. -Is physical tamper possible?…”
Section: Threat Models Of the Solutionsmentioning
confidence: 99%