brownsys / K9db
MySQL-compatible database for GDPR compliance by construction.
☆30Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for K9db
- A formally verified security module for AMD confidential VMs☆34Updated 2 weeks ago
- A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves☆29Updated 3 years ago
- Multilayered, Log-structured Secure Disk (MlsDisk) protects the disk I/O for TEEs☆16Updated 4 months ago
- Trusted in-memory key-value store based on ShieldStore which is published in EuroSys 2019☆37Updated last year
- Cryptographic Enforcement of End-to-End Data Privacy☆24Updated 2 years ago
- The Confidential Computing Certifier Framework consists of a client API called the Certifier-API and server-based policy evaluation calle…☆56Updated last month
- Jinzhao Disk (JinDisk) is a log-structured secure block device for TEEs. This repo is JinDisk's Linux version.☆37Updated last year
- Rust library abstracting Linux AMD SEV and SEV-SNP ioctls.☆89Updated this week
- Rollback protection for confidential services☆30Updated last year
- Privacy Budget Orchestration in Machine Learning Workloads☆24Updated last year
- An extensible compiler for cryptography.☆20Updated this week
- sgxtop and sgxstat utilities for monitoring SGX driver statistics☆26Updated 4 years ago
- An Oblivious General-Purpose SQL Database for the Cloud☆56Updated 4 years ago
- Next-Gen Occlum, a work-in-progress fork of Occlum that is optimized for the next-generation of Intel SGX (on Xeon SP processors)☆33Updated last year
- Jinzhao Attest provides unified attestation workflow for TEE compatibility, usability and security.☆29Updated 10 months ago
- ☆58Updated 7 months ago
- ☆26Updated last year
- SGX-secured Function-as-a-Service☆14Updated last year
- rkt-io Library OS for running Linux applications inside of Intel SGX enclaves☆29Updated 2 years ago
- ☆11Updated this week
- Implementation of the Reusable Enclaves paper☆12Updated last year
- MAGE: Memory-Aware Garbling Engine☆26Updated 3 months ago
- A high-throughput oblivious storage system☆23Updated last year
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆24Updated 6 months ago
- ☆30Updated 2 years ago
- Proof of Being Fogotten (PoBF) and PoBF-Compliant Framework (PoCF) prototypes.☆18Updated last year
- ☆57Updated last month
- An Open and Cross-platform Trusted Execution Environment.☆138Updated last month
- ☆33Updated 4 years ago
- Build Trusted Chain for Cloud Native in Confidential Computing Envrionment☆16Updated 3 weeks ago