Sökning: "Confidential Computing"

Visar resultat 1 - 5 av 8 uppsatser innehållade orden Confidential Computing.

  1. 1. Energy Poverty : Computing the silent problem of developed countries

    Kandidat-uppsats, Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknik

    Författare :Alfred Larsson; Märta Strømme; Herman Falkenmark; Freja Klucis; [2023]
    Nyckelord :Energy Poverty;

    Sammanfattning : Energy poverty is a new term in the Swedish context, though it is becoming increasingly more relevant because of inflation and higher prices for electricity. Because research on the matter is scarce in developed countries such as Sweden and similar contexts in the EU, it creates uncertainty whether there is a ‘correct’ way of conducting energy poverty research. LÄS MER

  2. 2. Security Management in Cloud Computing for healthcare Data

    Magister-uppsats, Luleå tekniska universitet

    Författare :Malik Asad; [2023]
    Nyckelord :;

    Sammanfattning : "In today's research field interconnected world, preventing security issues and confidentiality breaches has become paramount to safeguarding sensitive information, and organizations must take proactive measures to ensure data security. Cloud computing enhances security management by reducing the likelihood of cyber-attacks. LÄS MER

  3. 3. Confidential Federated Learning with Homomorphic Encryption

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Zekun Wang; [2023]
    Nyckelord :Cloud Technology; Confidential Computing; Federated Learning; Homomorphic Encryption; Trusted Execution Environment; Molnteknik; Konfidentiell databehandling; Federerad inlärning; Homomorfisk kryptering; Betrodd körningsmiljö;

    Sammanfattning : Federated Learning (FL), one variant of Machine Learning (ML) technology, has emerged as a prevalent method for multiple parties to collaboratively train ML models in a distributed manner with the help of a central server normally supplied by a Cloud Service Provider (CSP). Nevertheless, many existing vulnerabilities pose a threat to the advantages of FL and cause potential risks to data security and privacy, such as data leakage, misuse of the central server, or the threat of eavesdroppers illicitly seeking sensitive information. LÄS MER

  4. 4. A comparison of the Basel III capital requirement models for financial institutions

    Master-uppsats, Lunds universitet/Matematisk statistik

    Författare :Sara Johannesson; Amanda Wahlberg; [2022]
    Nyckelord :Basel III; Internal Model Method IMM ; Standardized Approch for Counterparty Credit Risk SA-CCR ; Counterparty Credit Risk; Capital Requirement; Mathematics and Statistics;

    Sammanfattning : The purpose of this report is to implement and compare the two Basel III standard methods on how to calculate the capital requirement for finan- cial institutions, related to counterparty credit risk. The models being the Standardized Approach for Counterparty Credit Risk (SA-CCR) and the Internal Model Method (IMM). LÄS MER

  5. 5. Confidential Computing in Public Clouds : Confidential Data Translations in hardware-based TEEs: Intel SGX with Occlum support

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Sri Yulianti; [2021]
    Nyckelord :TEEs; Intel SGX; Library OS; Occlum; Confidential Computing; Confidential Machine Learning; TEEs; Intel SGX; Library OS; Occlum; Konfidentiell databehandling; konfidentiellt maskininlärning;

    Sammanfattning : As enterprises migrate their data to cloud infrastructure, they increasingly need a flexible, scalable, and secure marketplace for collaborative data creation, analysis, and exchange among enterprises. Security is a prominent research challenge in this context, with a specific question on how two mutually distrusting data owners can share their data. LÄS MER