Back to Search Start Over

Elevating Security with Arm CCA.

Authors :
Garcia-Tobin, Charles
Knight, Mark
Source :
Communications of the ACM. Oct2024, Vol. 67 Issue 10, p34-39. 6p.
Publication Year :
2024

Abstract

Confidential computing offers significant potential to enhance the security of computing platforms by minimizing the trusted computing base (TCB) and reducing attack surfaces. It relies on innovations in both hardware and software to enable secure operation, particularly those managed by third parties. Attestation and verification mechanisms are essential for establishing trust in confidential computing, and as adoption grows, certifiers and regulators may play a larger role in guiding consumer decisions.

Details

Language :
English
ISSN :
00010782
Volume :
67
Issue :
10
Database :
Academic Search Index
Journal :
Communications of the ACM
Publication Type :
Periodical
Accession number :
179943084
Full Text :
https://doi.org/10.1145/3685700