Author of the publication

VC3: Trustworthy Data Analytics in the Cloud Using SGX.

, , , , , , and . IEEE Symposium on Security and Privacy, page 38-54. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Central: Understanding and Predicting Workloads for Improved Resource Management in Large Cloud Platforms., , , , , and . SOSP, page 153-167. ACM, (2017)PAC: Practical Accountability for CCF., , , , , , , , , and 2 other author(s). CoRR, (2021)Application-transparent checkpointing in Mach 3.O/UX., and . HICSS (1), page 114-123. IEEE Computer Society, (1995)Fault-Tolerance for Off-The-Shelf Applications and Hardware., and . FTCS, page 67-71. IEEE Computer Society, (1995)Serverless in the Wild: Characterizing and Optimizing the Serverless Workload at a Large Cloud Provider., , , , , , , , , and . USENIX Annual Technical Conference, page 205-218. USENIX Association, (2020)Confidential Computing: Elevating Cloud Security and Privacy: Working toward a more secure and innovative future.. ACM Queue, 21 (4): 44-48 (2023)Toward confidential cloud computing., , , , , , , and . Commun. ACM, 64 (6): 54-61 (2021)Confidential Computing: Elevating Cloud Security and Privacy.. Commun. ACM, 67 (1): 52-53 (January 2024)Replay For Concurrent Non-Deterministic Shared Memory Applications., and . PLDI, page 258-266. ACM, (1996)Why Should I Trust Your Code?, , , , , , and . Commun. ACM, 67 (1): 68-76 (January 2024)