{"title":"潜在不可信节点上远程计算的验证","authors":"H. Masuda, Kentaro Kita, Y. Koizumi, T. Hasegawa","doi":"10.1109/ICNP.2019.8888063","DOIUrl":null,"url":null,"abstract":"Verifying remote computing environments, such as computing nodes in fog and edge computing, has gained considerable attention. This poster extends an existing remote attestation method so that it can verify that obtained results are generated by trusted computing nodes as well as remote computing nodes are trusted.","PeriodicalId":385397,"journal":{"name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"On Verification of Remote Computing on Potentially Untrusted Nodes\",\"authors\":\"H. Masuda, Kentaro Kita, Y. Koizumi, T. Hasegawa\",\"doi\":\"10.1109/ICNP.2019.8888063\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Verifying remote computing environments, such as computing nodes in fog and edge computing, has gained considerable attention. This poster extends an existing remote attestation method so that it can verify that obtained results are generated by trusted computing nodes as well as remote computing nodes are trusted.\",\"PeriodicalId\":385397,\"journal\":{\"name\":\"2019 IEEE 27th International Conference on Network Protocols (ICNP)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 27th International Conference on Network Protocols (ICNP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICNP.2019.8888063\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNP.2019.8888063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On Verification of Remote Computing on Potentially Untrusted Nodes
Verifying remote computing environments, such as computing nodes in fog and edge computing, has gained considerable attention. This poster extends an existing remote attestation method so that it can verify that obtained results are generated by trusted computing nodes as well as remote computing nodes are trusted.