A survey on the (in)security of trusted execution environments.
Antonio MuñozRuben RiosRodrigo RománJavier LópezPublished in: Comput. Secur. (2023)
Keyphrases
- network connection
- trusted computing
- intrusion detection
- computing environments
- information security
- access control
- security requirements
- security issues
- real world
- security level
- statistical databases
- security policies
- network security
- highly dynamic environments
- remote attestation
- security measures
- trusted platform module
- security threats
- information assurance
- outsourced databases
- ubiquitous computing environments
- security protocols
- key management
- distributed environment
- authentication protocol
- security systems
- security analysis
- trust relationships
- computer security
- human operators
- data flow
- robotic systems
- dynamic environments
- database