{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:07:10Z","timestamp":1730344030246,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,27]],"date-time":"2021-09-27T00:00:00Z","timestamp":1632700800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,27]]},"DOI":"10.23919\/mipro52101.2021.9597198","type":"proceedings-article","created":{"date-parts":[[2021,11,15]],"date-time":"2021-11-15T17:54:21Z","timestamp":1636998861000},"page":"1213-1218","source":"Crossref","is-referenced-by-count":2,"title":["Confidential Computing as an Attempt to Secure Service Provider's Confidential Client Data in a Multi-Tenant Cloud Environment"],"prefix":"10.23919","author":[{"given":"Bojan","family":"Novkovic","sequence":"first","affiliation":[]},{"given":"Anita","family":"Bozic","sequence":"additional","affiliation":[]},{"given":"Marin","family":"Golub","sequence":"additional","affiliation":[]},{"given":"Stjepan","family":"Gros","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2647955"},{"key":"ref11","article-title":"Introducing Azure confidential computing","author":"russinovich","year":"2017","journal-title":"MicrosoftAzure Blog"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214301"},{"key":"ref15","first-page":"1","article-title":"Intel SGX Explained","volume":"2016","author":"costan","year":"2016","journal-title":"IACR Cryptol ePrint Arch"},{"key":"ref16","article-title":"AMD memory encryption","author":"kaplan","year":"2016","journal-title":"White Paper"},{"journal-title":"White Paper","article-title":"Strengthening VM isolation with integrity protection andmore","year":"2020","key":"ref17"},{"key":"ref18","article-title":"Protecting VM register state with SEV-ES","author":"kaplan","year":"2017","journal-title":"White Paper"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2799647"},{"journal-title":"2020 Data Breach Investigations Report","year":"2020","author":"enterprise","key":"ref4"},{"journal-title":"Cost of a data breach report 2020","year":"2020","key":"ref3"},{"journal-title":"Uncovering secuirty design flaws using the stride approach","year":"2006","author":"hernan","key":"ref6"},{"journal-title":"Threat modeling cheat sheet","year":"2020","key":"ref5"},{"journal-title":"Threat modeling Architecting &#x2014;& designingwith security in mind","year":"2020","author":"jagannathan","key":"ref8"},{"journal-title":"Application threat modeling via the pasta methodology","year":"2013","key":"ref7"},{"key":"ref2","article-title":"Midyear quickview data breach report","author":"goddijn","year":"2019","journal-title":"RiskBased Security"},{"journal-title":"Cyber securitybreaches survey 2020","year":"2020","key":"ref1"},{"key":"ref9","article-title":"Hardware-Enabled Security for Server Platforms: Enabling a Layered Approach to Platform Securityfor Cloud and Edge Computing Use Cases (Draft)","author":"bartock","year":"2020","journal-title":"Tech Rep"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00025"},{"journal-title":"Stealthdb A scalable encrypted database with full sql query support","year":"2017","author":"gribov","key":"ref22"},{"key":"ref21","first-page":"523","article-title":"Hacking in darkness: Return-oriented programming against secure enclaves","author":"lee","year":"0","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"}],"event":{"name":"2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO)","start":{"date-parts":[[2021,9,27]]},"location":"Opatija, Croatia","end":{"date-parts":[[2021,10,1]]}},"container-title":["2021 44th International Convention on Information, Communication and Electronic Technology (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9594913\/9596611\/09597198.pdf?arnumber=9597198","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T17:19:54Z","timestamp":1648487994000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9597198\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,27]]},"references-count":22,"URL":"https:\/\/doi.org\/10.23919\/mipro52101.2021.9597198","relation":{},"subject":[],"published":{"date-parts":[[2021,9,27]]}}}