The main premise of federated learning (FL) is that machine learning mod...
The main premise of federated learning is that machine learning model up...
Traditional email encryption schemes are vulnerable to EFail attacks, wh...
Modern NVMM is closing the gap between DRAM and persistent storage, both...
The popularity of the Java programming language has led to its wide adop...
Intel's software guard extensions (SGX) provide hardware enclaves to
gua...
Crypto-coins (also known as cryptocurrencies) are tradable digital asset...
Federated Learning (FL) opens new perspectives for training machine lear...
The VEDLIoT project targets the development of energy-efficient Deep Lea...
Over the last decade, the cloud computing landscape has transformed from...
WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gai...
Fault-tolerance techniques depend on replication to enhance availability...
Attestation is a fundamental building block to establish trust over soft...
Attestation is a fundamental building block to establish trust over soft...
Latest ARM processors are approaching the computational power of x86
arc...
This paper introduces NVCache, an approach that uses a non-volatile main...
Docker images are used to distribute and deploy cloud-native application...
Edge devices are increasingly in charge of storing privacy-sensitive dat...
Major cloud providers such as Amazon, Google and Microsoft provide nowad...
With the increasing popularity of cloud based machine learning (ML)
tech...
WebAssembly is an increasingly popular lightweight binary instruction fo...
Network appliances continue to offer novel opportunities to offload
proc...
Trusted Execution Environments (TEEs), such as Intel Software Guard
eXte...
DNN learning jobs are common in today's clusters due to the advances in ...
Blockchain technology promises to revolutionize manufacturing industries...
The publish-subscribe paradigm is an efficient communication scheme with...
Physical health records belong to healthcare providers, but the informat...
Serverless computing has become a major trend among cloud providers. Wit...
Reusable microservice artefacts are often deployed as black or grey boxe...
With the advent of the Internet of Things (IoT), the ever growing number...
The performance and behavior of large-scale distributed applications is
...
Trust is arguably the most important challenge for critical services bot...
This paper presents our preliminary results with ABEONA, an edge-to-clou...
The growing availability of hardware-based trusted execution environment...
Today's big data clusters based on the MapReduce paradigm are capable of...
Medical data belongs to whom it produces it. In an increasing manner, th...
Cloud providers usually offer diverse types of hardware for their users....
The latest generation of Intel processors supports Software Guard Extens...
The TrustZone technology, available in the vast majority of recent ARM
p...
Processing sensitive data, such as those produced by body sensors, on
th...
The implementation, deployment and testing of secure services for Intern...
The deployment of large-scale distributed systems, e.g., publish-subscri...
This paper presents PUBSUB-SGX, a content-based publish-subscribe system...
Containers are becoming the de facto standard to package and deploy
appl...
We present the SecureCloud EU Horizon 2020 project, whose goal is to ena...
The growing adoption of distributed data processing frameworks in a wide...
The exploitation of user search queries by search engines is at the hear...
By regularly querying Web search engines, users (unconsciously) disclose...