Please use this identifier to cite or link to this item:
https://doi.org/10.21256/zhaw-25581
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Geppert, Tim | - |
dc.contributor.author | Deml, Stefan | - |
dc.contributor.author | Sturzenegger, David | - |
dc.contributor.author | Ebert, Nico | - |
dc.date.accessioned | 2022-09-08T09:27:22Z | - |
dc.date.available | 2022-09-08T09:27:22Z | - |
dc.date.issued | 2022 | - |
dc.identifier.issn | 2624-9898 | de_CH |
dc.identifier.uri | https://digitalcollection.zhaw.ch/handle/11475/25581 | - |
dc.description.abstract | A lack of trust in the providers is still a major barrier to cloud computing adoption – especially when sensitive data is involved. While current privacy-enhancing technologies, such as homomorphic encryption, can increase security, they come with a considerable performance overhead. As an alternative Trusted Executing Environment (TEE) provides trust guarantees for code execution in the cloud similar to transport layer security for data transport or advanced encryption standard algorithms for data storage. Cloud infrastructure providers like Amazon, Google, and Microsoft introduced TEEs as part of their infrastructure offerings. This review will shed light on the different technological options of TEEs, as well as give insight into organizational issues regarding their usage. | de_CH |
dc.language.iso | en | de_CH |
dc.publisher | Frontiers Research Foundation | de_CH |
dc.relation.ispartof | Frontiers in Computer Science | de_CH |
dc.rights | http://creativecommons.org/licenses/by/4.0/ | de_CH |
dc.subject | Cloud computing | de_CH |
dc.subject | Confidential computing | de_CH |
dc.subject | SGX | de_CH |
dc.subject | Trusted execution environment | de_CH |
dc.subject.ddc | 005: Computerprogrammierung, Programme und Daten | de_CH |
dc.title | Trusted execution environments : applications and organizational challenges | de_CH |
dc.type | Beitrag in wissenschaftlicher Zeitschrift | de_CH |
dcterms.type | Text | de_CH |
zhaw.departement | School of Management and Law | de_CH |
zhaw.organisationalunit | Institut für Wirtschaftsinformatik (IWI) | de_CH |
dc.identifier.doi | 10.3389/fcomp.2022.930741 | de_CH |
dc.identifier.doi | 10.21256/zhaw-25581 | - |
zhaw.funding.eu | No | de_CH |
zhaw.issue | 930741 | de_CH |
zhaw.originated.zhaw | Yes | de_CH |
zhaw.publication.status | publishedVersion | de_CH |
zhaw.volume | 4 | de_CH |
zhaw.publication.review | Peer review (Publikation) | de_CH |
zhaw.author.additional | No | de_CH |
zhaw.display.portrait | Yes | de_CH |
zhaw.monitoring.costperiod | 2022 | de_CH |
Appears in collections: | Publikationen School of Management and Law |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2022_Geppert-etal_Trusted-execution-environments-applications-challenges_fcomp.pdf | 620.23 kB | Adobe PDF | View/Open |
Show simple item record
Geppert, T., Deml, S., Sturzenegger, D., & Ebert, N. (2022). Trusted execution environments : applications and organizational challenges. Frontiers in Computer Science, 4(930741). https://doi.org/10.3389/fcomp.2022.930741
Geppert, T. et al. (2022) ‘Trusted execution environments : applications and organizational challenges’, Frontiers in Computer Science, 4(930741). Available at: https://doi.org/10.3389/fcomp.2022.930741.
T. Geppert, S. Deml, D. Sturzenegger, and N. Ebert, “Trusted execution environments : applications and organizational challenges,” Frontiers in Computer Science, vol. 4, no. 930741, 2022, doi: 10.3389/fcomp.2022.930741.
GEPPERT, Tim, Stefan DEML, David STURZENEGGER und Nico EBERT, 2022. Trusted execution environments : applications and organizational challenges. Frontiers in Computer Science. 2022. Bd. 4, Nr. 930741. DOI 10.3389/fcomp.2022.930741
Geppert, Tim, Stefan Deml, David Sturzenegger, and Nico Ebert. 2022. “Trusted Execution Environments : Applications and Organizational Challenges.” Frontiers in Computer Science 4 (930741). https://doi.org/10.3389/fcomp.2022.930741.
Geppert, Tim, et al. “Trusted Execution Environments : Applications and Organizational Challenges.” Frontiers in Computer Science, vol. 4, no. 930741, 2022, https://doi.org/10.3389/fcomp.2022.930741.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.