Academic Journal
Elevating Security with Arm CCA ; Attestation and verification are integral to adopting confidential computing.
العنوان: | Elevating Security with Arm CCA ; Attestation and verification are integral to adopting confidential computing. |
---|---|
المؤلفون: | Garcia-Tobin, Charles, Knight, Mark |
المصدر: | Queue ; volume 22, issue 2, page 39-56 ; ISSN 1542-7730 1542-7749 |
بيانات النشر: | Association for Computing Machinery (ACM) |
سنة النشر: | 2024 |
الوصف: | Confidential computing has great potential to improve the security of general-purpose computing platforms by taking supervisory systems out of the TCB, thereby reducing the size of the TCB, the attack surface, and the attack vectors that security architects must consider. Confidential computing requires innovations in platform hardware and software, but these have the potential to enable greater trust in computing, especially on devices that are owned or controlled by third parties. Early consumers of confidential computing will need to make their own decisions about the platforms they choose to trust. As confidential computing becomes mainstream, however, it's possible that certifiers and regulators will share this burden, enabling customers to make informed choices without having to undertake their own evaluations. |
نوع الوثيقة: | article in journal/newspaper |
اللغة: | English |
DOI: | 10.1145/3664291 |
الاتاحة: | http://dx.doi.org/10.1145/3664291 https://dl.acm.org/doi/pdf/10.1145/3664291 |
رقم الانضمام: | edsbas.3F4B83FB |
قاعدة البيانات: | BASE |
DOI: | 10.1145/3664291 |
---|