期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Confidential computing and related technologies:a critical review 被引量:1
1
作者 Muhammad Usama Sardar Christof Fetzer 《Cybersecurity》 EI CSCD 2023年第4期26-32,共7页
This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the defi... This research critically reviews the definition of confidential computing(CC)and the security comparison of CC with other related technologies by the Confidential Computing Consortium(CCC).We demonstrate that the definitions by CCC are ambiguous,incomplete and even conflicting.We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair.We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues.These recommendations are the first step towards more precise definitions and reliable comparisons in the future. 展开更多
关键词 confidential computing(CC) Trusted Execution Environment(TEE) Homomorphic Encryption(HE) Trusted Platform Module(TPM) Formal methods
原文传递
国家标准项目《信息安全技术 机密计算通用框架》试点实践
2
作者 王惠莅 邱勤 +2 位作者 庞婷 葛小宇 张高山 《China Standardization》 2023年第S01期52-56,共5页
Data security and privacy protection have become the focus of cybersecurity protection in many countries.The utilization of confidential computing technology can significantly enhance data security.However,there are a... Data security and privacy protection have become the focus of cybersecurity protection in many countries.The utilization of confidential computing technology can significantly enhance data security.However,there are a variety of confidential computing technology routes,with significant differences in the principles and interfaces of implementation.There is an urgent need to develop relevant standards and specifications and guide the design,development,deployment and application of confidential computing related products.This paper introduces the development progress of the national standard project“Information security techniques—General framework for the confidential computing”and its pilot application scenarios across various industries.Additionally,it proposes suggestions on modifying and improving the standard to promote the healthy development of the confidential computing industry ecosystem. 展开更多
关键词 CYBERSECURITY data security privacy protection confidential computing
下载PDF
Confidential machine learning on untrusted platforms:a survey
3
作者 Sharma Sagar Chen Keke 《Cybersecurity》 EI CSCD 2021年第1期461-479,共19页
With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)fo... With the ever-growing data and the need for developing powerful machine learning models,data owners increasingly depend on various untrusted platforms(e.g.,public clouds,edges,and machine learning service providers)for scalable processing or collaborative learning.Thus,sensitive data and models are in danger of unauthorized access,misuse,and privacy compromises.A relatively new body of research confidentially trains machine learning models on protected data to address these concerns.In this survey,we summarize notable studies in this emerging area of research.With a unified framework,we highlight the critical challenges and innovations in outsourcing machine learning confidentially.We focus on the cryptographic approaches for confidential machine learning(CML),primarily on model training,while also covering other directions such as perturbation-based approaches and CML in the hardware-assisted computing environment.The discussion will take a holistic way to consider a rich context of the related threat models,security assumptions,design principles,and associated trade-offs amongst data utility,cost,and confidentiality. 展开更多
关键词 confidential computing Cryptographic protocols Machine learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部