Essays about: "AMD SEV"
Found 4 essays containing the words AMD SEV.
-
1. Automating Deployments of Trusted Execution Environments
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Hardware-based TEEs (Trusted Execution Environments) are gaining adoption and becoming more prevalent in today’s computing landscape. In a cloud-native world, where everything runs on ephemeral compute, having the luxury of experts setting up computation environments before running a workload is no longer a possibility. READ MORE
-
2. Trusted Execution Environment deployment through cloud Virtualization : Aproject on scalable deployment of virtual machines
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the context of cloud computing, Trusted Execution Environments (TEE) are isolated areas of application software that can be executed with better security, building a trusted and secure environment that is detached from the rest of the memory. Trusted Execution Environment is a technology that become available only in the last few years, and it is not widespread yet. READ MORE
-
3. The Viability of Using Trusted Execution Environments to Protect Data in Node-RED : A study on using AMD-SEV and Intel SGX to protect sensitive data when Node-RED is deployed on the cloud.
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of Things (IoT) consists of a network of physical devices that are connected over the internet for the purpose of exchanging data with other devices and systems. IoT platforms, such as Node-RED, have been introduced in recent times to facilitate communication between different IoT devices. READ MORE
-
4. Confidential Computing in Public Clouds : Confidential Data Translations in hardware-based TEEs: Intel SGX with Occlum support
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As enterprises migrate their data to cloud infrastructure, they increasingly need a flexible, scalable, and secure marketplace for collaborative data creation, analysis, and exchange among enterprises. Security is a prominent research challenge in this context, with a specific question on how two mutually distrusting data owners can share their data. READ MORE