Filter dates
Overview
- third party
- complex environments
- access control
- sensitive data
- integrity checking
Publications
Triad: Trusted Timestamps in Untrusted Environments.
CoRR
A Last-Level Defense for Application Integrity and Confidentiality.
CoRR
Triad: Trusted Timestamps in Untrusted Environments.
CloudCom
LLD: A Last-Level Defense for Application Integrity and Confidentiality.
UCC
Secure container orchestration in the cloud: policies and implementation.
SAC
Vallum: Privacy, Confidentiality and Access Controlfor Sensitive Data in Cloud Environments.
CloudCom