Academic Journal

Elevating Security with Arm CCA ; Attestation and verification are integral to adopting confidential computing.

التفاصيل البيبلوغرافية
العنوان: Elevating Security with Arm CCA ; Attestation and verification are integral to adopting confidential computing.
المؤلفون: Garcia-Tobin, Charles, Knight, Mark
المصدر: Queue ; volume 22, issue 2, page 39-56 ; ISSN 1542-7730 1542-7749
بيانات النشر: Association for Computing Machinery (ACM)
سنة النشر: 2024
الوصف: Confidential computing has great potential to improve the security of general-purpose computing platforms by taking supervisory systems out of the TCB, thereby reducing the size of the TCB, the attack surface, and the attack vectors that security architects must consider. Confidential computing requires innovations in platform hardware and software, but these have the potential to enable greater trust in computing, especially on devices that are owned or controlled by third parties. Early consumers of confidential computing will need to make their own decisions about the platforms they choose to trust. As confidential computing becomes mainstream, however, it's possible that certifiers and regulators will share this burden, enabling customers to make informed choices without having to undertake their own evaluations.
نوع الوثيقة: article in journal/newspaper
اللغة: English
DOI: 10.1145/3664291
الاتاحة: http://dx.doi.org/10.1145/3664291
https://dl.acm.org/doi/pdf/10.1145/3664291
رقم الانضمام: edsbas.3F4B83FB
قاعدة البيانات: BASE