Cloud computing poses challenges for systems that require confidentiality.
Manuel Costa
Author Archives
Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
Toward Confidential Cloud Computing
Extending hardware-enforced cryptographic protection to data while in use.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved