User Tools

Site Tools


pe-bpmn-editor_stereotypes

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision Both sides next revision
pe-bpmn-editor_stereotypes [2018/11/26 10:51]
pullonen [Intel SGX]
pe-bpmn-editor_stereotypes [2018/11/26 10:52]
pullonen [Intel SGX]
Line 60: Line 60:
 A crucial component of SGX computation is the remote attestation where the parties giving inputs or otherwise interacting with the SGX machines can be convinced that their inputs will go to SGX and the code running in SGX is as expected. In that process the enclave runs the [[pe-bpmn-editor_sgxattestationenclave|SGXAttestationEnclave]] task and the client runs [[pe-bpmn-editor_sgxattestationchallenge|SGXAttestationChallenge]] A crucial component of SGX computation is the remote attestation where the parties giving inputs or otherwise interacting with the SGX machines can be convinced that their inputs will go to SGX and the code running in SGX is as expected. In that process the enclave runs the [[pe-bpmn-editor_sgxattestationenclave|SGXAttestationEnclave]] task and the client runs [[pe-bpmn-editor_sgxattestationchallenge|SGXAttestationChallenge]]
  
-In addition, we consider [[pe-bpmn-editor_sgxquoting|SGXQuoting]] to produce a signed confirmation of the enclave and [[pe-bpmn-editor_sgxquoteverification|SGXQuoteVerification]] that is a procedure run by the Intel service to verify the quote.+In addition, we consider [[pe-bpmn-editor_sgxquoting|SGXQuoting]] to produce a signed confirmation of the enclave and [[pe-bpmn-editor_sgxquoteverification|SGXQuoteVerification]] that is a procedure run by the Intel service to verify the quote. These are a part of the attestation process and help to draw attention to the need of the additional Intel server if necessary.
 ==== Networking ==== ==== Networking ====
 At the moment we have two networking stereotypes that apply to message flows [[pe-bpmn-editor_securechannel|SecureChannel]] and [[pe-bpmn-editor_communicationprotection|CommunicationProtection]]. The latter is the general stereotype that denotes any form of PET applied to the transmission. However, the former is used for confidential communication channel (that also ensures integrity), e.g. what is achieved with TLS. At the moment we have two networking stereotypes that apply to message flows [[pe-bpmn-editor_securechannel|SecureChannel]] and [[pe-bpmn-editor_communicationprotection|CommunicationProtection]]. The latter is the general stereotype that denotes any form of PET applied to the transmission. However, the former is used for confidential communication channel (that also ensures integrity), e.g. what is achieved with TLS.
pe-bpmn-editor_stereotypes.txt ยท Last modified: 2020/07/15 15:30 by pullonen