Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
Mark Russinovich
Author Archives
Confidential Computing: Elevating Cloud Security and Privacy
Working toward a more secure and innovative future.
Toward Confidential Cloud Computing
Extending hardware-enforced cryptographic protection to data while in use.
Toward ML-Centric Cloud Platforms
Exploring the opportunities to use ML, the possible designs, and our experience with Microsoft Azure.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved