• 09/26/2020
  • Technical contribution

Extending the “Circle of Trust” with Confidential Computing

Confidential Computing provides a security model to address the problems of untrusted server infrastructure that have hampered transition to the cloud.

Written by Richard Searle

itsa 365: a kind of water surface with light waves

Loading component...

Loading component...

Loading component...