Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System.
Rafael C. R. CondeCarlos Alberto MazieroNewton Carlos WillPublished in: ISCC (2018)
Keyphrases
- operating system
- trust negotiation
- security mechanisms
- user privacy
- data encryption
- windows nt
- privacy preserving
- identity management
- computer systems
- access control policies
- security policies
- access control
- third party
- private information
- computer architecture
- virtual machine
- distributed systems
- microsoft windows
- address space
- privacy protection
- application level
- virtual memory
- data privacy
- personal information
- memory management
- database
- privacy preservation
- data security
- multi core processors
- sensitive information
- database design
- multi tasking