22
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Shielding Applications from an Untrusted Cloud with Haven

      , ,
      ACM Transactions on Computer Systems
      Association for Computing Machinery (ACM)

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references39

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          A Digital Signature Based on a Conventional Encryption Function

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Innovative instructions and software model for isolated execution

              Bookmark
              • Record: found
              • Abstract: not found
              • Conference Proceedings: not found

              Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems

                Bookmark

                Author and article information

                Journal
                ACM Transactions on Computer Systems
                ACM Trans. Comput. Syst.
                Association for Computing Machinery (ACM)
                07342071
                September 11 2015
                August 31 2015
                : 33
                : 3
                : 1-26
                Article
                10.1145/2799647
                8c5452f7-dc68-4797-8f35-d4cfa65070b9
                © 2015

                http://www.acm.org/publications/policies/copyright_policy#Background

                History

                Comments

                Comment on this article