Login / Signup
SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution.
Maurice Bailleu
Jörg Thalheim
Pramod Bhatotia
Christof Fetzer
Michio Honda
Kapil Vaswani
Published in:
FAST (2019)
Keyphrases
</>
computer vision
data flow
real time
information systems
three dimensional
bayesian networks
learning environment
cooperative
information technology
relational databases
business process
information security
execution model