Completed
Trusted Protection Modules
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Confidential Computing in Cloud and Edge
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 Problem Statement
- 4 Security Landscape
- 5 Goal
- 6 Concerns
- 7 Sensitive Data
- 8 Hardware Assisted Virtualization
- 9 Integrity Protection
- 10 Design Principles
- 11 Trusted Execution Environment TEA
- 12 HSM
- 13 Trusted Protection Modules
- 14 Programmability
- 15 Use Cases
- 16 Confidential AI for Healthcare
- 17 Confidential Computing
- 18 Trusted Execution Environment Properties
- 19 Unit of Isolation
- 20 Programmable Te
- 21 Implementation Solutions
- 22 Trusted Execution
- 23 attestation flows
- 24 field examples
- 25 What is good to have
- 26 Combined example
- 27 Tee example
- 28 Key takeaways
- 29 Audience questions
- 30 Closing remarks