Confidential computing and related technologies: a critical review
نویسندگان
چکیده
Abstract This research critically reviews the definition of confidential computing (CC) and security comparison CC with other related technologies by Confidential Computing Consortium (CCC). We demonstrate that definitions CCC are ambiguous, incomplete even conflicting. also is neither scientific nor fair. highlight issues in comparisons provide initial recommendations for fixing issues. These first step towards more precise reliable future.
منابع مشابه
A Critical Comparison of Trusted Computing and Trust Management Technologies
Mainly justified by the growing concern about vulnerabilities of IT systems, some new technologies are being integrated into computing devices, for realizing so-called Trusted Computing systems. However, they are raising questions about intrusive cyber-control over individual user activities and data, but also about consequences in cyber-war scenarios. The aim of this article is to confront Tru...
متن کاملCritical Review of Pipeline Scale Measurement Technologies
Submit Manuscript | http://medcraveonline.com Abbreviations: PMMA: Poly Methyl Methacrylate; TSMR: Thickness Shear Mode Resonator; IECOFS: Intrinsic Exposed Core Optical Fiber Sensor; ATR: Attenuated Total Reflectance; DTS: Distributed Temperature Sensor; CPSM: Cylindrical Phase Shift Migration Algorithm; ANNs: Artificial Neural Networks; MFL: Magnetic Flux Leakage; ICS: Internal Corrosion Sens...
متن کاملCritical Review of Pipeline Scale Measurement Technologies
Submit Manuscript | http://medcraveonline.com Abbreviations: PMMA: Poly Methyl Methacrylate; TSMR: Thickness Shear Mode Resonator; IECOFS: Intrinsic Exposed Core Optical Fiber Sensor; ATR: Attenuated Total Reflectance; DTS: Distributed Temperature Sensor; CPSM: Cylindrical Phase Shift Migration Algorithm; ANNs: Artificial Neural Networks; MFL: Magnetic Flux Leakage; ICS: Internal Corrosion Sens...
متن کاملA Review on Slash and Related Distributions
The normal distribution plays an important role in statistical analysis. However, a researcher may also wish to construct another symmetric distributions which fit the data better than the normal distribution. For this purpose, more flexible distributions have been introduced. In this thesis, we introduce some of such distributions. We first introduce the slash distribution as a f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybersecurity
سال: 2023
ISSN: ['2523-3246']
DOI: https://doi.org/10.1186/s42400-023-00144-1