Confidential Computing in Cloud and Edge

Confidential Computing in Cloud and Edge

RSA Conference via YouTube Direct link

Trusted Protection Modules

13 of 30

13 of 30

Trusted Protection Modules

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Confidential Computing in Cloud and Edge

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Problem Statement
  4. 4 Security Landscape
  5. 5 Goal
  6. 6 Concerns
  7. 7 Sensitive Data
  8. 8 Hardware Assisted Virtualization
  9. 9 Integrity Protection
  10. 10 Design Principles
  11. 11 Trusted Execution Environment TEA
  12. 12 HSM
  13. 13 Trusted Protection Modules
  14. 14 Programmability
  15. 15 Use Cases
  16. 16 Confidential AI for Healthcare
  17. 17 Confidential Computing
  18. 18 Trusted Execution Environment Properties
  19. 19 Unit of Isolation
  20. 20 Programmable Te
  21. 21 Implementation Solutions
  22. 22 Trusted Execution
  23. 23 attestation flows
  24. 24 field examples
  25. 25 What is good to have
  26. 26 Combined example
  27. 27 Tee example
  28. 28 Key takeaways
  29. 29 Audience questions
  30. 30 Closing remarks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.