ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
27
views
39
references
Top references
cited by
32
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,284
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Shielding Applications from an Untrusted Cloud with Haven
Author(s):
Andrew Baumann
,
Marcus Peinado
,
Galen Hunt
Publication date
Created:
September 11 2015
Publication date
(Print):
August 31 2015
Journal:
ACM Transactions on Computer Systems
Publisher:
Association for Computing Machinery (ACM)
Read this article at
ScienceOpen
Publisher
Further versions
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Applications of SAXS
Most cited references
39
Record
: found
Abstract
: not found
Book Chapter
: not found
A Digital Signature Based on a Conventional Encryption Function
Ralph C. Merkle
(1988)
0
comments
Cited
79
times
– based on
0
reviews
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Innovative instructions and software model for isolated execution
Frank McKeen
,
Ilya Alexandrovich
,
Alex Berenzon
…
(2013)
0
comments
Cited
71
times
– based on
0
reviews
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems
Yuanzhong Xu
,
Weidong Cui
,
Marcus Peinado
(2015)
0
comments
Cited
68
times
– based on
0
reviews
All references
Author and article information
Journal
Title:
ACM Transactions on Computer Systems
Abbreviated Title:
ACM Trans. Comput. Syst.
Publisher:
Association for Computing Machinery (ACM)
ISSN (Print):
07342071
Publication date Created:
September 11 2015
Publication date (Print):
August 31 2015
Volume
: 33
Issue
: 3
Pages
: 1-26
Article
DOI:
10.1145/2799647
SO-VID:
8c5452f7-dc68-4797-8f35-d4cfa65070b9
Copyright ©
© 2015
License:
http://www.acm.org/publications/policies/copyright_policy#Background
History
Data availability:
Comments
Comment on this article
Sign in to comment
Related Documents Log
scite_
Similar content
1,284
AppBastion: Protection from Untrusted Apps and OSes on ARM
Authors:
Darius Suciu
,
Radu Sion
,
Michael Ferdman
Multiscale dependence, spillovers, and connectedness between precious metals and currency markets: A hedge and safe-haven analysis
Authors:
Walid Mensi
,
Syed Riaz Mahmood Ali
,
Xuan Vinh Vo
…
HAVEN: Haptic And Visual Environment Navigation by a Shape-Changing Mobile Robot with Multimodal Perception
Authors:
Barry W. Mulvey
,
Thrishantha Nanayakkara
See all similar
Cited by
32
Twenty Security Considerations for Cloud-Supported Internet of Things
Authors:
David Eyers
,
Hajoon Ko
,
Jean Bacon
…
PRESAGE: PRivacy-preserving gEnetic testing via SoftwAre Guard Extension
Authors:
Feng Chen
,
Chenghong Wang
,
Wenrui Dai
…
CacheZoom: How SGX Amplifies the Power of Cache Attacks
Authors:
Ahmad Moghimi
,
Gorka Irazoqui
,
Thomas Eisenbarth
See all cited by
Most referenced authors
387
Y Li
Y Xu
Z. Zhou
See all reference authors