Posted on
in Presentations
Trusted Execution Environments (TEEs) implement safe data processing environments inside untrusted or compromised computers. They can be used for confidential data processing in public clouds where they protect encrypted code and data from malicious administrators and hackers. This talk will describe architectures, runtimes, compilers and tooling for the creation of confidential computing services using TEEs.
Learning Objectives:
1: Learn about secure enclave technologies,
2: Understand application use cases for secure enclaves.
3: Learn the components of a confidential computing architecture.
Learning Objectives:
1: Learn about secure enclave technologies,
2: Understand application use cases for secure enclaves.
3: Learn the components of a confidential computing architecture.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community