• Computer Science
  • Published 2005

Integrity Checking in Remote Computation

@inproceedings{Falcarin2005IntegrityCI,
  title={Integrity Checking in Remote Computation},
  author={Paolo Falcarin and Riccardo Scandariato and Mario Baldi and Yoram Ofek},
  year={2005}
}
How can a client-side application be entrusted albeit running inside an un-trusted environment? Within an un-trusted environment a possibly malicious user has complete access to system resources and tools in order to tamper with the application code. Under those assumptions, the server-side application needs a way to continuously ascertain that the client code has not been altered prior to and during execution, i.e., the server is required to continuously entrust the client. To address this… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-4 OF 4 CITATIONS

Entrusting Remote Software Executed in an Untrusted Computation Helper

VIEW 5 EXCERPTS
HIGHLY INFLUENCED

Computation Certification as a Service in the Cloud

VIEW 2 EXCERPTS
CITES BACKGROUND

A Time and Storage Efficient Solution to Remote File Integrity Check

VIEW 2 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-5 OF 5 REFERENCES