User Tools

Site Tools


pe-bpmn-editor_stereotypes

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Next revision Both sides next revision
pe-bpmn-editor_stereotypes [2018/11/26 10:51]
pullonen [Intel SGX]
pe-bpmn-editor_stereotypes [2018/11/26 10:57]
pullonen
Line 60: Line 60:
 A crucial component of SGX computation is the remote attestation where the parties giving inputs or otherwise interacting with the SGX machines can be convinced that their inputs will go to SGX and the code running in SGX is as expected. In that process the enclave runs the [[pe-bpmn-editor_sgxattestationenclave|SGXAttestationEnclave]] task and the client runs [[pe-bpmn-editor_sgxattestationchallenge|SGXAttestationChallenge]] A crucial component of SGX computation is the remote attestation where the parties giving inputs or otherwise interacting with the SGX machines can be convinced that their inputs will go to SGX and the code running in SGX is as expected. In that process the enclave runs the [[pe-bpmn-editor_sgxattestationenclave|SGXAttestationEnclave]] task and the client runs [[pe-bpmn-editor_sgxattestationchallenge|SGXAttestationChallenge]]
  
-In addition, we consider [[pe-bpmn-editor_sgxquoting|SGXQuoting]] to produce a signed confirmation of the enclave and [[pe-bpmn-editor_sgxquoteverification|SGXQuoteVerification]] that is a procedure run by the Intel service to verify the quote.+In addition, we consider [[pe-bpmn-editor_sgxquoting|SGXQuoting]] to produce a signed confirmation of the enclave and [[pe-bpmn-editor_sgxquoteverification|SGXQuoteVerification]] that is a procedure run by the Intel service to verify the quote. These are a part of the attestation process and help to draw attention to the need of the additional Intel server if necessary.
 ==== Networking ==== ==== Networking ====
 At the moment we have two networking stereotypes that apply to message flows [[pe-bpmn-editor_securechannel|SecureChannel]] and [[pe-bpmn-editor_communicationprotection|CommunicationProtection]]. The latter is the general stereotype that denotes any form of PET applied to the transmission. However, the former is used for confidential communication channel (that also ensures integrity), e.g. what is achieved with TLS. At the moment we have two networking stereotypes that apply to message flows [[pe-bpmn-editor_securechannel|SecureChannel]] and [[pe-bpmn-editor_communicationprotection|CommunicationProtection]]. The latter is the general stereotype that denotes any form of PET applied to the transmission. However, the former is used for confidential communication channel (that also ensures integrity), e.g. what is achieved with TLS.
  
  
 +==== Differential privacy ====
 +The [[pe-bpmn-editor_differentialprivacy|DifferentialPrivacy]] stereotype can be used to denote tasks that deploy differential privacy as part of their computations. The stereotype allows to fix the parameters for differential privacy, however, at the moment these are not used by the analyzer. However, it will be interesting to consider these tasks when different analyzers are merged.
  
  
pe-bpmn-editor_stereotypes.txt ยท Last modified: 2020/07/15 15:30 by pullonen