{"id":"https://openalex.org/W4404563885","doi":"https://doi.org/10.1109/tcc.2024.3503358","title":"A Run-Time Framework for Ensuring Zero-Trust State of Client\u2019s Machines in Cloud Environment","display_name":"A Run-Time Framework for Ensuring Zero-Trust State of Client\u2019s Machines in Cloud Environment","publication_year":2024,"publication_date":"2024-11-20","ids":{"openalex":"https://openalex.org/W4404563885","doi":"https://doi.org/10.1109/tcc.2024.3503358"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2024.3503358","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2024.3503358","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028602607","display_name":"Devki Nandan Jha","orcid":"https://orcid.org/0000-0003-1322-2588"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Devki Nandan Jha","raw_affiliation_strings":["School of Computing, Newcastle University Newcastle Upon Tyne, Newcastle upon Tyne, U.K","School of Computing, Newcastle University Newcastle Upon Tyne, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing, Newcastle University Newcastle Upon Tyne, Newcastle upon Tyne, U.K","institution_ids":[]},{"raw_affiliation_string":"School of Computing, Newcastle University Newcastle Upon Tyne, U.K","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046063327","display_name":"Graham Lenton","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Graham Lenton","raw_affiliation_strings":["CyberHive Ltd., Newbury, U.K"],"affiliations":[{"raw_affiliation_string":"CyberHive Ltd., Newbury, U.K","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089046549","display_name":"James Asker","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"James Asker","raw_affiliation_strings":["CyberHive Ltd., Newbury, U.K"],"affiliations":[{"raw_affiliation_string":"CyberHive Ltd., Newbury, U.K","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016318031","display_name":"David Blundell","orcid":"https://orcid.org/0000-0001-5571-6071"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"David Blundell","raw_affiliation_strings":["CyberHive Ltd., Newbury, U.K"],"affiliations":[{"raw_affiliation_string":"CyberHive Ltd., Newbury, U.K","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060098599","display_name":"Martin Higgins","orcid":"https://orcid.org/0000-0002-7936-3159"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Martin Higgins","raw_affiliation_strings":["Oxford e-Research Centre, University of Oxford, Oxford, U.K","Oxford e-Research Centre, University of Oxford, U.K"],"affiliations":[{"raw_affiliation_string":"Oxford e-Research Centre, University of Oxford, Oxford, U.K","institution_ids":["https://openalex.org/I40120149"]},{"raw_affiliation_string":"Oxford e-Research Centre, University of Oxford, U.K","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024840324","display_name":"David Wallom","orcid":"https://orcid.org/0000-0001-7527-3407"},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"David C. H. Wallom","raw_affiliation_strings":["Oxford e-Research Centre, University of Oxford, Oxford, U.K","Oxford e-Research Centre, University of Oxford, U.K"],"affiliations":[{"raw_affiliation_string":"Oxford e-Research Centre, University of Oxford, Oxford, U.K","institution_ids":["https://openalex.org/I40120149"]},{"raw_affiliation_string":"Oxford e-Research Centre, University of Oxford, U.K","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5028602607"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.871,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.95570579,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"13","issue":"1","first_page":"61","last_page":"74"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9764999747276306,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8753548860549927},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6970789432525635},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.5832814574241638},{"id":"https://openalex.org/keywords/zero","display_name":"Zero (linguistics)","score":0.5740466713905334},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4201495051383972},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33914652466773987},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.305616170167923},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1512901484966278}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8753548860549927},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6970789432525635},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.5832814574241638},{"id":"https://openalex.org/C2780813799","wikidata":"https://www.wikidata.org/wiki/Q3274237","display_name":"Zero (linguistics)","level":2,"score":0.5740466713905334},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4201495051383972},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33914652466773987},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.305616170167923},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1512901484966278},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcc.2024.3503358","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2024.3503358","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.5600000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W2207945425","https://openalex.org/W2757976082","https://openalex.org/W2766928942","https://openalex.org/W2774926829","https://openalex.org/W2785355036","https://openalex.org/W2808804937","https://openalex.org/W2909477982","https://openalex.org/W2971118467","https://openalex.org/W2977953318","https://openalex.org/W2996103205","https://openalex.org/W3006334328","https://openalex.org/W3008629209","https://openalex.org/W3013394726","https://openalex.org/W3014099641","https://openalex.org/W3014873211","https://openalex.org/W3035401658","https://openalex.org/W3083560262","https://openalex.org/W3110169949","https://openalex.org/W3132594723","https://openalex.org/W3154117064","https://openalex.org/W3171802458","https://openalex.org/W3174251760","https://openalex.org/W3195279647","https://openalex.org/W3198200730","https://openalex.org/W4205316938","https://openalex.org/W4206209637","https://openalex.org/W4220692398","https://openalex.org/W4220693827","https://openalex.org/W4283723350","https://openalex.org/W4285048954","https://openalex.org/W4285506347","https://openalex.org/W4286308005","https://openalex.org/W4309561483","https://openalex.org/W4309647996","https://openalex.org/W4319303304","https://openalex.org/W4321484315","https://openalex.org/W4324290749","https://openalex.org/W4352976871","https://openalex.org/W4361858768","https://openalex.org/W4383750730","https://openalex.org/W4386590864","https://openalex.org/W4387666910","https://openalex.org/W4387682115","https://openalex.org/W4391470024","https://openalex.org/W4391582629","https://openalex.org/W4391897269","https://openalex.org/W4392412467","https://openalex.org/W4399744879","https://openalex.org/W4401580184","https://openalex.org/W6781032154","https://openalex.org/W6788615891"],"related_works":["https://openalex.org/W4244478748","https://openalex.org/W4223488648","https://openalex.org/W2134969820","https://openalex.org/W2251605416","https://openalex.org/W1997222214","https://openalex.org/W2560439919","https://openalex.org/W4389340727","https://openalex.org/W3150465815","https://openalex.org/W2802581102","https://openalex.org/W4205786897"],"abstract_inverted_index":{"With":[0],"the":[1,10,18,84,94,98,104,109,141,168,184],"unprecedented":[2],"demand":[3],"for":[4,38],"cloud":[5,19,51],"computing,":[6],"ensuring":[7,83],"trust":[8],"in":[9,17,59,103,160],"underlying":[11],"environment":[12],"is":[13],"challenging.":[14],"Applications":[15],"executing":[16,159],"are":[20,189],"prone":[21],"to":[22,56,182],"attacks":[23,34],"of":[24,42,48,89,100,112,143,156,170,179],"different":[25],"types":[26],"including":[27],"malware,":[28],"network":[29],"and":[30,62,130],"data":[31],"manipulation.":[32],"These":[33],"may":[35],"remain":[36],"undetected":[37],"a":[39,46,80,153,161,177],"significant":[40],"length":[41],"time":[43],"thus":[44,107],"causing":[45],"lack":[47],"trust.":[49],"Untrusted":[50],"services":[52],"can":[53],"also":[54,139],"lead":[55],"business":[57],"losses":[58],"many":[60],"cases":[61],"therefore":[63],"need":[64],"urgent":[65],"attention.":[66],"In":[67],"this":[68],"paper,":[69],"we":[70],"present":[71],"<italic":[72,85],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[73,78,86,118,145,172],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Trusted":[74],"Public":[75],"Cloud</i>":[76],"(<sc":[77],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">TPC</small>),":[79],"generic":[81],"framework":[82],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">Zero-trust</i>":[87],"security":[88,113,136],"client":[90,157,191],"machine.":[91],"It":[92],"tracks":[93],"system":[95,185],"state,":[96,106],"alerting":[97],"user":[99],"unexpected":[101],"changes":[102],"machine\u2019s":[105],"increasing":[108],"run-time":[110],"detection":[111],"vulnerabilities.":[114],"We":[115,138],"validated":[116],"<sc":[117,144,171],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">TPC</small>":[119,146,173],"on":[120,147],"Microsoft":[121],"Azure":[122],"with":[123,152],"Local,":[124],"Software":[125,131],"Trusted":[126],"Platform":[127],"Module":[128],"(SWTPM)":[129],"Guard":[132],"Extension":[133],"(SGX)-enabled":[134],"SWTPM":[135],"providers.":[137],"evaluated":[140],"scalability":[142],"Amazon":[148],"Web":[149],"Services":[150],"(AWS)":[151],"varying":[154],"number":[155],"machines":[158,192],"concurrent":[162],"environment.":[163],"The":[164],"execution":[165],"results":[166],"show":[167],"effectiveness":[169],"as":[174],"it":[175],"takes":[176],"maximum":[178],"35.6":[180],"seconds":[181],"recognise":[183],"state":[186],"when":[187],"there":[188],"128":[190],"attached.":[193]},"counts_by_year":[{"year":2025,"cited_by_count":6}],"updated_date":"2025-12-22T23:10:17.713674","created_date":"2025-10-10T00:00:00"}
