Secure Computation Interfaces

user-5f8411ab4c775e9685ff56d3(2015)

引用 1|浏览19
暂无评分
摘要
Introduction Applications such as secure Hadoop [1] need to have part of their data and code isolated from privileged software (e.g., the operating system), and they need to be able to establish secure communication channels between the isolated code and remote machines. This document investigates the APIs needed to develop these applications. These APIs isolate the applications from the underlying hardware or software that provides “secure computation” [2, 3, 4, 5]. For example, the applications should work independently of whether isolation is implemented using SGX [6], or using Hypervisor-based isolation techniques [2, 3, 4, 5].
更多
查看译文
关键词
Secure multi-party computation,Secure two-party computation,Secure communication,Hypervisor,Software,Operating system,Computer science,Communication channel,Isolation techniques
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要