Elevating Security with Arm CCA: Attestation and verification are integral to adopting confidential computing.
Charles Garcia-TobinMark KnightPublished in: ACM Queue (2024)
Keyphrases
- statistical databases
- trusted computing
- confidential information
- high security
- inference control
- java card
- integrity verification
- sensitive data
- remote attestation
- information security
- access control
- canonical correlation analysis
- cryptographic protocols
- security requirements
- security protocols
- trusted third party
- intrusion detection
- cloud computing
- security mechanisms
- computing platform
- formal analysis
- data security
- privacy protection
- security issues
- security policies
- confidential data
- data sets