RAitc: Securely Auditing the Remotely Executed Applications
One of the most important security challenges in remote computing (e.g., cloud computing) is protecting users' applications running on the service platform from malicious attacks. Because remote users have little control over the platform, a malicious platform manager or platform-sharing guest...
Main Authors: | Lei Zhou, Entao Luo, Guojun Wang |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2020-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9183981/ |
Similar Items
-
Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment
by: Junghee Lee, et al.
Published: (2020-01-01) -
An active and verifiable trust evaluation approach for edge computing
by: Wen Mo, et al.
Published: (2020-09-01) -
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election
by: Xukai Zou, et al.
Published: (2017-08-01) -
Secure Collaborative Publicly Verifiable Computation
by: Qiang Wang, et al.
Published: (2017-01-01) -
Evaluating Trust Assurance in Indy-Based Identity Networks Using Public Ledger Data
by: Will Abramson, et al.
Published: (2021-04-01)