Kaynağa Gözat

Removed a sentence that I added twice in the previous commits.

Miti Mazmudar 4 yıl önce
ebeveyn
işleme
3e1c9f9d2d
1 değiştirilmiş dosya ile 1 ekleme ve 3 silme
  1. 1 3
      README.md

+ 1 - 3
README.md

@@ -5,14 +5,12 @@ This repository contains Docker files for reproducing the implementation of the
 Miti Mazmudar, Ian Goldberg. "Mitigator: Privacy policy compliance using trusted hardware".  
 Proceedings on Privacy Enhancing Technologies. Vol. 2020, No. 3. 18 pages. July 2020.
 
-*Note:* This system requires a machine with Intel Software Guard Extension (SGX) in order to be built and to function correctly. We install appropriate versions of the following through our dockerscripts.
+*Note:* This system requires a machine with Intel Software Guard Extension (SGX) in order to be built and to function correctly. We install appropriate versions of the following through our dockerscripts below.
 * Linux SGX driver
 * Graphene-SGX driver
 * Linux SGX SDK
 * Graphene-SGX library OS
 
-Linux SGX and Graphene-SGX drivers and the Linux SGX SDK through our dockerscripts below.
-
 This system consists of three enclaves: a decryptor, a verifier and a target enclave. The target enclave is a PHP-enabled apache web server, which obtains user data through forms and we wish to ensure compliance of the webserver with its privacy policy. The Linux SGX driver and Linux SGX SDK are required to run the decryptor enclave. The Linux SGX SDK is also required for the enclaves to attest to each other and to seal secrets to disk. We use the Graphene-SGX library to support running a proof-of-concept verifier and the target application. The target application also contains a PHP extension to interface with the decryptor enclave. The Graphene-SGX driver is required to run any applications within Graphene. 
 
 We use Docker scripts to reproduce our setup for our paper. Two of our scripts set up drivers and the others set up and launch a docker container for running the three enclaves.