top of page

From low level primitives to complex capabilities, we believe in the power of proofs (aka demos)

DR is targeting the four application areas below. Drop us a note if you have a specific application and are interested in collaborating to build a proof-of-concept.

Securing critical data and analytics in the cloud

Moving critical enterprise data (e.g., financial data) to the cloud requires security and safety assurances. While current commercial cloud offerings claim security built on confidential computing implementations, in reality a host of middleware has not yet been developed to make this possible. Datica Research is working on these services. 

AI training over distributed data

AI models depend on their training data.  Accessing high quality data over distributed spaces require adhering to bespoke policies set by the data owners. AI developers need to provide assurances up front that the agreement with the data owner is immutable - not even by the system administrator. Datica Research is proving a framework for secure data pooling for AI training. We are also proving a scheme for licensing access to trained models. 

Smart factory floor integration

In an environment where multiple technologies and vendors are working together, "mundane" tasks, from communications and data exchanges to performing upgrades, become critical security issues that could threaten business competitiveness. Datica Research is proving a framework for fine-grained control over data confidentiality and operational visibility. 

Data management and collaboration

The days of hyperscalers may be soon coming to an end. Yet, for the alternatives (e.g., distributed dataspaces) to work, an underpinning technology solution is required to guarantee enforcement up front of data sharing policies. Datica Research is proving a global-scale data collaboration fabric. 

Usability, safety, and security.

DR approaches every projects by rethinking security based on latest technical advances and current industry practices (instead of patching or modifying current solutions).  Our demos seek to prove the following:

  • Safety: If your system misbehaves, perhaps due to unintentional user error such as a surgeon sneezing while holding a haptics controller, you need hack-proof guarantees that the system will at least remain within safety bounds.

  • Control: Fine-grained access control is relatively easy in a setting where owners, users, and applications are well-known. In lesser rigid set up (e.g., sharing health data with the research community), the required flexibility demands new approaches to guarantee access control. 

  • Scalability: Low-level security, e.g., TPM, has been largely solved decades ago (by Datica's principals). Today's enterprise systems demand scaling these security properties to support much larger scope, scale, and ubiquity. Toward this end, DR is working on trusted platforms (TPs, no Ms). 

  • Usability: We firmly believe that "a secure system operates with ease of use and appropriate transparency for human operators and user," and work toward that end. 

​ 

Datica Research is part of the community.  We actively and contribute to, and often lead efforts for, open source tools, standards development, and communities of practice. ​From the early days of hardware-based platform security, DR principals contributed to the founding of Trusted Computing Group. Today, DR principals are among leading contributors to the Confidential Computing Consortium, especially the effort to develop the Certifier Framework. 

bottom of page