Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
Kapil Vaswani
Author Archives
Toward Confidential Cloud Computing
Extending hardware-enforced cryptographic protection to data while in use.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved