04357nam 22006615 450 991086918070332120251116205420.03-031-55561-910.1007/978-3-031-55561-9(MiAaPQ)EBC31505442(Au-PeEL)EBL31505442(CKB)32575354900041(DE-He213)978-3-031-55561-9(OCoLC)1443932746(EXLCZ)993257535490004120240626d2024 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierTrusted Execution Environments /by Carlton Shepherd, Konstantinos Markantonakis1st ed. 2024.Cham :Springer International Publishing :Imprint: Springer,2024.1 online resource (211 pages)Computer Science Series3-031-55560-0 Introduction -- Background Material -- Operating System Controls -- Isolated Hardware Execution Platforms -- Building Execution Environments from the Trusted Platform Module -- Trusted World Systems -- Enclave Computing -- Deployment Issues, Attacks, and Other Challenges -- Conclusion.Trusted execution environments (TEEs) protect sensitive code and data on computing platforms, even when the primary operating system is compromised. Once a technical curiosity, TEEs have rapidly become a key component in securing numerous systems from cloud servers to constrained devices. Today, TEEs have been deployed on billions of devices for protecting financial payments, personal files, copyrighted media content, and many others. Despite this, TEEs remain poorly understood due to their complexity and diversity. This book addresses this gap, providing a comprehensive treatment of different TEE technologies, their features, benefits, and shortcomings. A holistic view of secure and trusted execution is taken, examining smart cards and CPU protection rings before discussing modern TEEs, such as Intel SGX and ARM TrustZone. A wide range of paradigms for building secure and trusted execution environments are explored, from dedicated security chips to system-on-chip extensions and virtualisation technologies. The relevant industry standards and specifications are covered in detail, including how TEEs are evaluated and certified in practice with respect to security. Several case studies are presented showing how TEEs are used in some common security mechanisms, such as secure boot sequences, biometric authentication, and file-based encryption. This book also discusses present challenges in the field, covering potential attack vectors against TEEs and concerns relating to fragmentation, interoperability, and transparency. Lastly, a selection of future directions are examined that may be used by the trusted execution environments of tomorrow. This book is particularly targeted at practitioners and researchers in cyber security, such as penetration testers, security engineers, and security analysts. Additionally, this book serves as a valuable resource for university students, both postgraduate and advanced undergraduates, and professors in computer science and electrical engineering.Computer Science SeriesData protectionComputer networksSecurity measuresCryptographyData encryption (Computer science)Cooperating objects (Computer systems)Data and Information SecurityMobile and Network SecurityCryptologyCyber-Physical SystemsData protection.Computer networksSecurity measures.Cryptography.Data encryption (Computer science)Cooperating objects (Computer systems)Data and Information Security.Mobile and Network Security.Cryptology.Cyber-Physical Systems.005.8Shepherd Carlton1743273Markantonakis Konstantinos1743274MiAaPQMiAaPQMiAaPQBOOK9910869180703321Trusted Execution Environments4170568UNINA03847nam 2200649Ia 450 991048435940332120251116185933.01-280-38962-197866135675433-642-16175-810.1007/978-3-642-16175-9(CKB)2670000000045147(SSID)ssj0000446844(PQKBManifestationID)11321220(PQKBTitleCode)TC0000446844(PQKBWorkID)10504695(PQKB)10922959(DE-He213)978-3-642-16175-9(MiAaPQ)EBC3065820(PPN)149024479(BIP)32334020(EXLCZ)99267000000004514720101101d2010 uy 0engurnn#008mamaatxtccrTransactions on large-scale data- and knowledge-centered systems II /Abdelkader Hameurlain ... [et al.] (eds.)1st ed. 2010.Berlin ;Heidelberg Springerc20101 online resource (XI, 141 p. 65 illus.)Lecture notes in computer science ;6380"First, it contains a selection of the best papers from the 11th International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2009), which was held from August 31 to September 2, 2009 in Linz, Austria. Second, it contains a special section of papers on a particularly challenging doman in information retrieval."-- Preface.3-642-16174-X Includes bibliographical references and author index.Data Warehousing and Knowledge Discovery -- Discovery of Frequent Patterns in Transactional Data Streams -- Fast Loads and Queries -- Efficient Online Aggregates in Dense-Region-Based Data Cube Representations -- Information Retrieval -- Improving Access to Large Patent Corpora -- Improving Retrievability and Recall by Automatic Corpus Partitioning.This special issue of TLDKS contains two kinds of papers. First, it contains a sel- th tion of the best papers from the 11 International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2009), which was held from August 31 to S- tember 2, 2009 in Linz, Austria. Second, it contains a special section of papers on a particularly challenging domain in information retrieval, namely patent retrieval. Over the last decade, the International Conference on Data Warehousing and Knowledge Discovery (DaWaK) has established itself as one of the most important international scientific events within data warehousing and knowledge discovery. DaWaK brings together a wide range of researchers and practitioners working on these topics. The DaWaK conference series thus serves as a leading forum for discu- th ing novel research results and experiences within the field. The 11 International Conference on Data Warehousing and Knowledge Discovery (DaWaK 2009) cont- ued the tradition by disseminating and discussing innovative models, methods, al- rithms, and solutions to the challenges faced by data warehousing and knowledge discovery technologies.Lecture notes in computer science ;6380.Data miningData warehousingExpert systems (Computer science)Information retrievalData mining.Data warehousing.Expert systems (Computer science)Information retrieval.005.74Hameurlain Abdelkader1380566DaWaK (Conference)(11th :2009 :Linz, Austria)MiAaPQMiAaPQMiAaPQBOOK9910484359403321Transactions on large-scale data- and knowledge-centered systems II4187862UNINA