ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
22
views
39
references
Top references
cited by
31
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,760
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Shielding Applications from an Untrusted Cloud with Haven
Author(s):
Andrew Baumann
,
Marcus Peinado
,
Galen Hunt
Publication date
Created:
September 11 2015
Publication date
(Print):
August 31 2015
Journal:
ACM Transactions on Computer Systems
Publisher:
Association for Computing Machinery (ACM)
Read this article at
ScienceOpen
Publisher
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electrospinning for biomedical applications
Most cited references
39
Record
: found
Abstract
: not found
Book Chapter
: not found
A Digital Signature Based on a Conventional Encryption Function
Ralph C. Merkle
(1988)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Innovative instructions and software model for isolated execution
Frank McKeen
,
Ilya Alexandrovich
,
Alex Berenzon
…
(2013)
0
comments
Cited
68
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
Yuanzhong Xu
,
Weidong Cui
,
Marcus Peinado
(2015)
0
comments
Cited
67
times
– based on
0
reviews
Bookmark
All references
Author and article information
Journal
Title:
ACM Transactions on Computer Systems
Abbreviated Title:
ACM Trans. Comput. Syst.
Publisher:
Association for Computing Machinery (ACM)
ISSN (Print):
07342071
Publication date Created:
September 11 2015
Publication date (Print):
August 31 2015
Volume
: 33
Issue
: 3
Pages
: 1-26
Article
DOI:
10.1145/2799647
SO-VID:
8c5452f7-dc68-4797-8f35-d4cfa65070b9
Copyright ©
© 2015
License:
http://www.acm.org/publications/policies/copyright_policy#Background
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,760
Needle exchange as a safe haven in an unsafe world.
Authors:
Joan MacNeil
,
Bernadette Pauly
Can Bitcoin be a diversifier, hedge or safe haven tool?
Authors:
Anders Stensås
,
Magnus Frostholm Nygaard
,
Khine Kyaw
…
Unbundling the Pollution Haven Hypothesis
Authors:
TAYLOR S.
,
M taylor
See all similar
Cited by
31
Twenty Security Considerations for Cloud-Supported Internet of Things
Authors:
David Eyers
,
Hajoon Ko
,
Jean Bacon
…
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension
Authors:
Feng Chen
,
Chenghong Wang
,
Wenrui Dai
…
Malware Guard Extension: Using SGX to Conceal Cache Attacks
Authors:
Michael Schwarz
,
Samuel Weiser
,
Daniel Gruss
…
See all cited by
Most referenced authors
380
Y Li
Y Xu
Z. Zhou
See all reference authors