{"id":381431,"date":"2017-05-05T10:45:07","date_gmt":"2017-05-05T17:45:07","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-group&#038;p=381431"},"modified":"2022-01-19T16:09:29","modified_gmt":"2022-01-20T00:09:29","slug":"cloud-and-infrastructure-security","status":"publish","type":"msr-group","link":"https:\/\/www.microsoft.com\/en-us\/research\/group\/cloud-and-infrastructure-security\/","title":{"rendered":"Cloud and Infrastructure Security Group"},"content":{"rendered":"<section class=\"mb-3 moray-highlight\">\n\t<div class=\"card-img-overlay mx-lg-0\">\n\t\t<div class=\"card-background  has-background-grey card-background--full-bleed\">\n\t\t\t\t\t<\/div>\n\t\t<!-- Foreground -->\n\t\t<div class=\"card-foreground d-flex mt-md-n5 my-lg-5 px-g px-lg-0\">\n\t\t\t<!-- Container -->\n\t\t\t<div class=\"container d-flex mt-md-n5 my-lg-5 align-self-center\">\n\t\t\t\t<!-- Card wrapper -->\n\t\t\t\t<div class=\"w-100 w-lg-col-5\">\n\t\t\t\t\t<!-- Card -->\n\t\t\t\t\t<div class=\"card material-md-card py-5 px-md-5\">\n\t\t\t\t\t\t<div class=\"card-body \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/lab\/microsoft-research-redmond\/\" class=\"icon-link icon-link--reverse mb-2\" data-bi-cN=\"Return to Microsoft Research Lab - Redmond\">\n\t\t\t\t\t\t\t\t\t<span class=\"c-glyph glyph-chevron-left\" aria-hidden=\"true\"><\/span>\n\t\t\t\t\t\t\t\t\tReturn to Microsoft Research Lab &#8211; Redmond\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n<h1 id=\"cloud-and-infrastructure-security-group\" class=\"h2\">Cloud and Infrastructure Security Group<\/h1>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n<p>The Cloud and Infrastructure Security Group in Microsoft Research in Redmond tackles tough challenges in many different areas related to the areas of security and privacy. In particular, our group has a strong focus in Cloud Security, Infrastructure Security, Hardware Security and Data-Driven Security.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Cloud and Infrastructure Security Group in Microsoft Research in Redmond tackles tough challenges in many different areas related to the areas of security and privacy. In particular, our group has a strong focus in Cloud Security, Infrastructure Security, Hardware Security and Data-Driven Security. <\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_group_start":"","footnotes":""},"research-area":[13558],"msr-group-type":[243694],"msr-locale":[268875],"msr-impact-theme":[],"class_list":["post-381431","msr-group","type-msr-group","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-group-type-group","msr-locale-en_us"],"msr_group_start":"","msr_detailed_description":"","msr_further_details":"","msr_hero_images":[],"msr_research_lab":[199565],"related-researchers":[{"type":"user_nicename","display_name":"Cormac Herley","user_id":31468,"people_section":"Group 1","alias":"cormac"},{"type":"user_nicename","display_name":"Marcus Peinado","user_id":32804,"people_section":"Group 1","alias":"marcuspe"},{"type":"user_nicename","display_name":"Jay Stokes","user_id":32427,"people_section":"Group 1","alias":"jstokes"},{"type":"user_nicename","display_name":"Dennis Mattoon","user_id":31607,"people_section":"Group 1","alias":"dennisma"},{"type":"user_nicename","display_name":"Eric Peterson","user_id":31753,"people_section":"Group 1","alias":"ericpete"},{"type":"user_nicename","display_name":"Sangho Lee","user_id":37905,"people_section":"Group 1","alias":"sanghle"}],"related-publications":[392585,392561,389804,358631,417887,392579,168200,168622,168179,168199,167853,166604,166174,168206,168207,168202,163818,162504,161680,161681,168211,159145,159942,168215,168216,901536,956442,942081,941559,929031,901554,901545,712387,570855,570867,574356,574398,574413,574425,590611,595390,595402,659775,659793,659802,670977,672096,707827,488015,712411,712417,723907,805708,805744,805828,805849,805855,805918,805927,833566,836344,878898,879600],"related-downloads":[],"related-videos":[],"related-projects":[212078,385757,385736,385718],"related-events":[],"related-opportunities":[],"related-posts":[],"tab-content":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/381431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-group"}],"version-history":[{"count":8,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/381431\/revisions"}],"predecessor-version":[{"id":897114,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group\/381431\/revisions\/897114"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=381431"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=381431"},{"taxonomy":"msr-group-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-group-type?post=381431"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=381431"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=381431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}