scholarly journals Distributed systems and trusted execution environments: Trade-offs and challenges

Author(s):  
Rafael Pereira Pires ◽  
Pascal Felber ◽  
Marcelo Pasin

This extended abstract summarises my PhD thesis, which explores design strategies for distributed systems that leverage trusted execution environments (TEEs). We aim at achieving better security and privacy guarantees while maintaining or improving performance in comparison to existing equivalent approaches. To that end, we propose a few original systems that take advantage of TEEs. On top of prototypes built with Intel software guard extensions (SGX) and deployed on real hardware, we evaluate their limitations and discuss the outcomes of such an emergent technology.

2016 ◽  
Vol 55 ◽  
pp. 224-226 ◽  
Author(s):  
Jemal Abawajy ◽  
Guojun Wang ◽  
Laurence T. Yang ◽  
Bahman Javadi

2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Ikenna J. Okeke ◽  
Tia Ghantous ◽  
Thomas A. Adams

Abstract This study presents a novel design and techno-economic analysis of processes for the purification of captured CO2 from the flue gas of an oxy-combustion power plant fueled by petroleum coke. Four candidate process designs were analyzed in terms of GHG emissions, thermal efficiency, pipeline CO2 purity, CO2 capture rate, levelized costs of electricity, and cost of CO2 avoided. The candidates were a classic process with flue-gas water removal via condensation, flue-gas water removal via condensation followed by flue-gas oxygen removal through cryogenic distillation, flue-gas water removal followed by catalytic conversion of oxygen in the flue gas to water via reaction with hydrogen, and oxy-combustion in a slightly oxygen-deprived environment with flue-gas water removal and no need for flue gas oxygen removal. The former two were studied in prior works and the latter two concepts are new to this work. The eco-technoeconomic analysis results indicated trade-offs between the four options in terms of cost, efficiency, lifecycle greenhouse gas emissions, costs of CO2 avoided, technical readiness, and captured CO2 quality. The slightly oxygen-deprived process has the lowest costs of CO2 avoided, but requires tolerance of a small amount of H2, CO, and light hydrocarbons in the captured CO2 which may or may not be feasible depending on the CO2 end use. If infeasible, the catalytic de-oxygenation process is the next best choice. Overall, this work is the first study to perform eco-technoeconomic analyses of different techniques for O2 removal from CO2 captured from an oxy-combustion power plant.


Author(s):  
Andreas Bolfing

The rapid progress of Information and Communication Technology (ICT) continuously intensifies the interest in the two disciplines of security and privacy. This chapter introduces the most important concepts of information security, which essentially include the three major security mechanisms identification, authentication and authorization. These mechanisms are used to obtain the most important security goals, namely confidentiality, integrity, availability and non-repudiation, which are standardized by many international organisations. The next section deals with the possible attacks against distributed systems, which are mainly the Denial-of-Service (DoS) and the Sybil attack. The chapter then concludes by introducing one possible defense mechanism against such attacks, which is now publicly known as Proof-of-Work (PoW).


2020 ◽  
pp. 100720 ◽  
Author(s):  
Seung Zeon Han ◽  
Eun-Ae Choi ◽  
Sung Hwan Lim ◽  
Sangshik Kim ◽  
Jehyun Lee

Soil Research ◽  
2017 ◽  
Vol 55 (6) ◽  
pp. 473 ◽  
Author(s):  
David J. Pannell

Economic insights are crucial for making sound decisions about farm-level management of nitrogen and also about regional or national policy such as for water pollution. In the present review, key insights are presented from a large and diverse literature on the economics of nitrogen in agriculture and the economics of the consequences of nitrogen fertilisation. Issues covered include (1) the economics of nitrogen as an input to production, (2) nitrogen and economic risk at the farm level, (3) the economics of nitrogen fixation by legumes, (4) the existence of flat payoff functions, which often allow wide flexibility in decisions about nitrogen fertiliser rates, (5) explanations for over-application of nitrogen fertilisers by some farmers, and (6) the economics of nitrogen pollution at both the farm level and the policy level. Economics helps to explain farmer behaviour and to design strategies and policies that are more beneficial and more likely to be adopted and successfully implemented.


Author(s):  
Jinju Kim ◽  
Michael Saidani ◽  
Harrison M. Kim

Abstract With the rapid development of new technology and the growing global competition in industry, it is essential for companies to protect their sensitive product designs and technologies. To ensure that their systems are not exploited by third-party competitors or remanufacturers, original equipment manufacturers often apply physical attributes and/or reduce commonality within a product family to prevent easy reusing and recovering. Yet, these design strategies are key barriers to the sustainable recovery and recycling of products. To address these trade-offs, this paper proposes a stepwise methodology to identify the sustainable optimal product family architecture design while protecting intellectual property on sensitive parts or modules. The developed approach notably allows the selection of suitable and sustainable candidates to share among products, taking into account the cost-benefit of commonality within the product family. As such, it can be used as a decision support tool to help product designers identify appropriate product family architecture design and find candidates that can be shared within a product family by considering both sustainability and security parameters.


Significance It tries to balance trade-offs between restricting access to data (to promote security and privacy) and allowing access to data (to promote trade in data and its commercial application). Impacts Data will be subject to greater government control, including classification and cataloguing. The law takes a stricter stance on cross-border flows, particularly vis-a-vis data requests by foreign law enforcement bodies. It will also perpetuate turf wars within the Chinese government.


Author(s):  
S. Hemamalini ◽  
M. L. Alphin Ezhil Manuel

Remote authentication is the most commonly used method to determine the identity of a remote client.Secure and efficient authentication scheme has been a very important issue with the development of networking technologies. In a Generic Framework for Authentication, preserving security and privacy in distributed systems provide three factors for authentication of clients. This paper investigates a systematic approach for authenticating clients by five factors, namely RFID card, PIN, biometrics, One Time Password (OTP) and keypad ID. The conversion not only significantly improves the information assurance at low cost but also protects client privacy in distributed systems.


Sign in / Sign up

Export Citation Format

Share Document