Login / Signup
ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture.
Supraja Sridhara
Andrin Bertschi
Benedict Schlüter
Mark Kuhne
Fabio Aliberti
Shweta Shinde
Published in:
USENIX Security Symposium (2024)
Keyphrases
</>
execution environment
data flow
execution model
software architecture
real time
management system
inference control
data mining
original data
network architecture
database
access control
personal information
statistical databases
program execution