{"id":381431,"date":"2017-05-05T10:45:07","date_gmt":"2017-05-05T17:45:07","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-group&p=381431"},"modified":"2022-01-19T16:09:29","modified_gmt":"2022-01-20T00:09:29","slug":"cloud-and-infrastructure-security","status":"publish","type":"msr-group","link":"https:\/\/www.microsoft.com\/en-us\/research\/group\/cloud-and-infrastructure-security\/","title":{"rendered":"Cloud and Infrastructure Security Group"},"content":{"rendered":"
\n\t
\n\t\t
\n\t\t\t\t\t<\/div>\n\t\t\n\t\t
\n\t\t\t\n\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\tReturn to Microsoft Research Lab – Redmond\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n

Cloud and Infrastructure Security Group<\/h1>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n

The Cloud and Infrastructure Security Group in Microsoft Research in Redmond tackles tough challenges in many different areas related to the areas of security and privacy. In particular, our group has a strong focus in Cloud Security, Infrastructure Security, Hardware Security and Data-Driven Security.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"

Cloud and Infrastructure Security Group in Microsoft Research in Redmond tackles tough challenges in many different areas related to the areas of security and privacy. In particular, our group has a strong focus in Cloud Security, Infrastructure Security, Hardware Security and Data-Driven Security. <\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"msr_group_start":"","footnotes":""},"research-area":[13558],"msr-group-type":[243694],"msr-locale":[268875],"msr-impact-theme":[],"class_list":["post-381431","msr-group","type-msr-group","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-group-type-group","msr-locale-en_us"],"msr_group_start":"","msr_detailed_description":"","msr_further_details":"","msr_hero_images":[],"msr_research_lab":[199565],"related-researchers":[{"type":"user_nicename","display_name":"Paul England","user_id":33226,"people_section":"Group 1","alias":"pengland"},{"type":"user_nicename","display_name":"Cormac Herley","user_id":31468,"people_section":"Group 1","alias":"cormac"},{"type":"user_nicename","display_name":"Marcus Peinado","user_id":32804,"people_section":"Group 1","alias":"marcuspe"},{"type":"user_nicename","display_name":"Jay Stokes","user_id":32427,"people_section":"Group 1","alias":"jstokes"},{"type":"user_nicename","display_name":"Dennis Mattoon","user_id":31607,"people_section":"Group 1","alias":"dennisma"},{"type":"user_nicename","display_name":"Eric Peterson","user_id":31753,"people_section":"Group 1","alias":"ericpete"},{"type":"user_nicename","display_name":"Sangho Lee","user_id":37905,"people_section":"Group 1","alias":"sanghle"}],"related-publications":[392585,392561,389804,358631,417887,392579,168200,168622,168179,168199,167853,166604,166174,168206,168207,168202,163818,162504,161680,161681,168211,159145,159942,168215,168216,878898,595390,723907,879600,595402,805708,901536,659775,805744,488015,901545,659793,805828,570855,901554,659802,805849,570867,929031,670977,805855,574356,941559,672096,805918,574398,942081,707827,805927,574413,956442,712387,833566,574425,712411,836344,590611,712417],"related-downloads":[966243],"related-videos":[],"related-projects":[],"related-events":[],"related-opportunities":[],"related-posts":[],"tab-content":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/381431"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-group"}],"version-history":[{"count":8,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/381431\/revisions"}],"predecessor-version":[{"id":897114,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/381431\/revisions\/897114"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=381431"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=381431"},{"taxonomy":"msr-group-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group-type?post=381431"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=381431"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=381431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}