About 5,910 results
Open links in new tab
  1. InkTag addresses important issues in the completeness and usability of untrusted operating systems, such as providing users of an untrusted OS with flexible access control and crash …

  2. Oct 20, 2023 · receiving signed messages from misconfigured workstations. Microsoft Outlook will send the entire undesired certificate chain (e.g. from DoD end user up to Common Policy) in …

  3. The objective of the work is to serve as a general guideline to providing network application services safely by wrapping untrusted applications and to explore the advantages of …

  4. Our goals for Haven Secure, private execution of unmodified applications (bugs and all) in an untrusted cloud on commodity hardware (Intel SGX)

  5. However, today’s large-scale distributed data management systems need to deal with untrust-worthy environments where multiple mutually distrustful entities communicate with each other, …

  6. In this paper, we tackle this challenge by introducing three novel schemes for authenticating outsourced top-k selection queries with user-defined scoring functions over multiple at-tributes …

  7. Conclusion Runtime compartmentalization • Creates a secure environment for untrusted operations such as deserialization Privilege de-escalation