Completed
TEEs compared to other secure hardware
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
The Rise of Confidential Computing
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Cloud Data Threats
- 3 Data Protection
- 4 Trusted Execution Environments (TEES)
- 5 TEE application architecture
- 6 Hyper-V Virtualization Based Security (VBS)
- 7 TEEs compared to other secure hardware
- 8 Common TEE application patterns
- 9 Confidential cloud
- 10 Azure and confidential computing
- 11 The ACC development environment
- 12 Universal cloud attestation
- 13 Preventing indirect information leaks
- 14 Confidential SQL Always Encrypted
- 15 Coco Framework architecture
- 16 Smart contract access control (cont)
- 17 Summary
- 18 References