{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T16:39:42Z","timestamp":1772642382647,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Korea government (MOTIE & DAPA) award","award":["18-CM-SW-09"],"award-info":[{"award-number":["18-CM-SW-09"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3342559.3365335","type":"proceedings-article","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T21:18:24Z","timestamp":1573852704000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Toward scaling hardware security module for emerging cloud services"],"prefix":"10.1145","author":[{"given":"Juhyeng","family":"Han","sequence":"first","affiliation":[{"name":"KAIST"}]},{"given":"Seongmin","family":"Kim","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Taesoo","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Tech"}]},{"given":"Dongsu","family":"Han","sequence":"additional","affiliation":[{"name":"KAIST"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Asylo: An Open and Flexible Framework for Enclave Applications. https:\/\/asylo.dev.  Asylo: An Open and Flexible Framework for Enclave Applications. https:\/\/asylo.dev."},{"key":"e_1_3_2_1_2_1","unstructured":"AWS CloudHSM. https:\/\/aws.amazon.com\/cloudhsm.  AWS CloudHSM. https:\/\/aws.amazon.com\/cloudhsm."},{"key":"e_1_3_2_1_3_1","unstructured":"Egnyte Key Management. https:\/\/www.egnyte.com\/encryption-key-management.html.  Egnyte Key Management. https:\/\/www.egnyte.com\/encryption-key-management.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Google Cloud HSM. https:\/\/cloud.google.com\/hsm.  Google Cloud HSM. https:\/\/cloud.google.com\/hsm."},{"key":"e_1_3_2_1_5_1","unstructured":"IBM Cloud HSM. https:\/\/www.ibm.com\/cloud\/hardware-security-module.  IBM Cloud HSM. https:\/\/www.ibm.com\/cloud\/hardware-security-module."},{"key":"e_1_3_2_1_6_1","unstructured":"IBM Systems cryptographic HSMs. https:\/\/www.ibm.com\/security\/cryptocards\/hsms.  IBM Systems cryptographic HSMs. https:\/\/www.ibm.com\/security\/cryptocards\/hsms."},{"key":"e_1_3_2_1_7_1","unstructured":"Intel\u00ae Software Guard Extensions SDK for Linux* OS. https:\/\/github.com\/intel\/linux-sgx.  Intel\u00ae Software Guard Extensions SDK for Linux * OS. https:\/\/github.com\/intel\/linux-sgx."},{"key":"e_1_3_2_1_8_1","volume-title":"Manage swarm security with public key infrastructure [Accessed","year":"2019","unstructured":"Official Docker v17.06 documentation. Manage swarm security with public key infrastructure [Accessed Aug. 20, 2019 ]. Official Docker v17.06 documentation. Manage swarm security with public key infrastructure [Accessed Aug. 20, 2019]."},{"key":"e_1_3_2_1_9_1","unstructured":"Open Enclave SDK. https:\/\/openenclave.io\/sdk.  Open Enclave SDK. https:\/\/openenclave.io\/sdk."},{"key":"e_1_3_2_1_10_1","unstructured":"OpenDNSSEC SoftHSM. https:\/\/www.opendnssec.org\/softhsm.  OpenDNSSEC SoftHSM. https:\/\/www.opendnssec.org\/softhsm."},{"key":"e_1_3_2_1_11_1","unstructured":"SafeNet Hardware Security Modules. https:\/\/safenet.gemalto.com\/data-encryption\/hardware-security-modules-hsms.  SafeNet Hardware Security Modules. https:\/\/safenet.gemalto.com\/data-encryption\/hardware-security-modules-hsms."},{"key":"e_1_3_2_1_12_1","unstructured":"Thales eSecurity Key Management. https:\/\/www.thalesesecurity.com\/products\/key-management.  Thales eSecurity Key Management. https:\/\/www.thalesesecurity.com\/products\/key-management."},{"key":"e_1_3_2_1_13_1","unstructured":"WolfSSL Intel SGX. https:\/\/www.wolfssl.com\/wolfssl-intel-sgx-fips-140--2.  WolfSSL Intel SGX. https:\/\/www.wolfssl.com\/wolfssl-intel-sgx-fips-140--2."},{"key":"e_1_3_2_1_14_1","volume-title":"Security requirements for cryptographic modules","author":"SPUB","year":"2001","unstructured":"FIP SPUB 140--2. Security requirements for cryptographic modules , 2001 . FIPSPUB 140--2. Security requirements for cryptographic modules, 2001."},{"key":"e_1_3_2_1_15_1","volume-title":"This is a Robbery! https:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Campana-Everybody-Be-Cool-This-Is-A-Robbery.pdf","author":"B\u00e9drune J.-B.","year":"2019","unstructured":"J.-B. B\u00e9drune Everybody be Cool , This is a Robbery! https:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Campana-Everybody-Be-Cool-This-Is-A-Robbery.pdf , 2019 . J.-B. B\u00e9drune et al. Everybody be Cool, This is a Robbery! https:\/\/i.blackhat.com\/USA-19\/Thursday\/us-19-Campana-Everybody-Be-Cool-This-Is-A-Robbery.pdf, 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152710"},{"key":"e_1_3_2_1_17_1","volume-title":"JSON web token (JWT). https:\/\/tools.ietf.org\/html\/rfc7519","author":"Bradley J.","year":"2015","unstructured":"J. Bradley JSON web token (JWT). https:\/\/tools.ietf.org\/html\/rfc7519 , 2015 . J. Bradley et al. JSON web token (JWT). https:\/\/tools.ietf.org\/html\/rfc7519, 2015."},{"key":"e_1_3_2_1_18_1","volume-title":"Intel SGX Enabled Key Manager Service with OpenStack Barbican. arXiv preprint arXiv:1712.07694","author":"Chakrabarti S.","year":"2017","unstructured":"S. Chakrabarti Intel SGX Enabled Key Manager Service with OpenStack Barbican. arXiv preprint arXiv:1712.07694 , 2017 . S. Chakrabarti et al. Intel SGX Enabled Key Manager Service with OpenStack Barbican. arXiv preprint arXiv:1712.07694, 2017."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3337167.3337173"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. ICSA. IEEE","author":"Chen L.","year":"2018","unstructured":"L. Chen . Microservices : architecting for continuous delivery and devops . In Proc. ICSA. IEEE , 2018 . L. Chen. Microservices: architecting for continuous delivery and devops. In Proc. ICSA. IEEE, 2018."},{"key":"e_1_3_2_1_21_1","unstructured":"CloudFlare. The DNSSEC Root Signing Ceremony. https:\/\/www.cloudflare.com\/dns\/dnssec\/root-signing-ceremony.  CloudFlare. The DNSSEC Root Signing Ceremony. https:\/\/www.cloudflare.com\/dns\/dnssec\/root-signing-ceremony."},{"key":"e_1_3_2_1_22_1","unstructured":"EFTLAB. HSMs in a Payment Industry. https:\/\/www.eftlab.com\/hsms-in-a-payment-industry.  EFTLAB. HSMs in a Payment Industry. https:\/\/www.eftlab.com\/hsms-in-a-payment-industry."},{"key":"e_1_3_2_1_23_1","volume-title":"Flash Memory Summit","author":"Haswell J.","year":"2016","unstructured":"J. Haswell . SSD Architectures to Ensure Security and Performance . Flash Memory Summit , 2016 . J. Haswell. SSD Architectures to Ensure Security and Performance. Flash Memory Summit, 2016."},{"key":"e_1_3_2_1_24_1","unstructured":"F. R. Konkel. The Pentagon isn't ready yet for classified information to be stored off-premise in the cloud. https:\/\/www.nextgov.com\/emerging-tech\/2015\/02\/dod-wants-physical-separation-classified-data-cloud-now\/105753.  F. R. Konkel. The Pentagon isn't ready yet for classified information to be stored off-premise in the cloud. https:\/\/www.nextgov.com\/emerging-tech\/2015\/02\/dod-wants-physical-separation-classified-data-cloud-now\/105753."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565591"},{"key":"e_1_3_2_1_26_1","volume-title":"TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone. In Proc. SOSE","author":"Luo S.","year":"2018","unstructured":"S. Luo TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone. In Proc. SOSE , 2018 . S. Luo et al. TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone. In Proc. SOSE, 2018."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_1_28_1","unstructured":"R. Stubbs. Turning Cryptography into a Service. https:\/\/www.cryptomathic.com\/news-events\/blog\/turning-cryptography-into-a-service-part-1.  R. Stubbs. Turning Cryptography into a Service. https:\/\/www.cryptomathic.com\/news-events\/blog\/turning-cryptography-into-a-service-part-1."},{"key":"e_1_3_2_1_29_1","unstructured":"Thales eSecurity. What is FIPS 140-2? https:\/\/www.thalesesecurity.com\/faq\/key-secrets-management\/what-fips-140-2.  Thales eSecurity. What is FIPS 140-2? https:\/\/www.thalesesecurity.com\/faq\/key-secrets-management\/what-fips-140-2."},{"key":"e_1_3_2_1_30_1","unstructured":"J. Wilder. PCI Requirement 3.6.6 - Using Split Knowledge & Dual Control. https:\/\/kirkpatrickprice.com\/video\/pci-requirement-3-6-6-using-split-knowledge-dual-control\/.  J. Wilder. PCI Requirement 3.6.6 - Using Split Knowledge & Dual Control. https:\/\/kirkpatrickprice.com\/video\/pci-requirement-3-6-6-using-split-knowledge-dual-control\/."},{"key":"e_1_3_2_1_31_1","volume-title":"Microservices: flexible software architecture","year":"2016","unstructured":"E.Wolff. Microservices: flexible software architecture . Addison-Wesley Professional , 2016 . E.Wolff. Microservices: flexible software architecture. Addison-Wesley Professional, 2016."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2018.00011"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820162"}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","location":"Huntsville Ontario Canada","acronym":"SOSP '19"},"container-title":["Proceedings of the 4th Workshop on System Software for Trusted Execution"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3342559.3365335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:01Z","timestamp":1750202581000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3342559.3365335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":33,"alternative-id":["10.1145\/3342559.3365335","10.1145\/3342559"],"URL":"https:\/\/doi.org\/10.1145\/3342559.3365335","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}