Latest News

RestAssured showcased at German Innovation Forum

Supported by the German Ministry for Education and Research, the University of Duisburg-Essen hosted the German Innovation Forum “Innovation interaktiv!” from 5-6 July 2018. The Forum addresses small and medium enterprises (SME) to help those bringing innovations to market.   Dr. Andreas Metzger (paluno, the Ruhr Institute for Software Technology of the University of Duisburg-Essen) […]

RestAssured: Securing Cloud Analytics – SYSTOR 2018

The secure analytics platform used in RestAssured, and developed by partner organisation IBM Research, was presented at the ACM International Systems and Storage Conference (SYSTOR) in June 2018. The accepted poster, “RestAssured: Securing Cloud Analytics”, which details the approach and the associated technologies such as Intel SGX, Apache Spark SQL and Opaque, has been published and […]

Adaptant Signs Agreement with KnowNow

  RestAssured consortium member Adaptant has signed an agreement with UK based firm KnowNow Information Ltd, that will bring their user consent management solution for automotive usage-based insurance (UBI), to market.   The UBI solution is being developed with RestAssured technology and will give drivers control over their data while the vehicle sends information to […]

Panel discussion on “Security and Adaptivity”

  SEAMS 2018, the 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, featured a panel discussion on security and adaptivity.   The panel was moderated by Professor David Garlan (Carnegie Mellon University) and included researchers from the University of Kent, Rochester Institute of Technology, and The Open University. RestAssured was represented in […]

Open Source – Trust Management in Intel SGX Enclaves

“Intel SGX (Software Guard Extension) technology, available in Skylake and later processors, allows to create secure memory regions (enclaves) protected with hardware encryption in the SoC (system on chip). The data is in cleartext only inside the processor. It is encrypted in the SoC before leaving to the main memory, and decrypted in SoC upon […]