Abstract
AbstractThis research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair. We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues. These recommendations are the first step towards more precise definitions and reliable comparisons in the future.
Funder
Deutsche Forschungsgemeinschaft
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Computer Networks and Communications,Information Systems,Software
Reference23 articles.
1. Acar A, Aksu H, Uluagac AS, Conti M (2018) A survey on homomorphic encryption schemes. ACM Comput Surv 51(4):1–35. https://doi.org/10.1145/3214303
2. Ahmad-Reza Sadeghi: Trusting The Trust Anchor: the struggle and challenges of trusted computing (2021). https://www.esat.kuleuven.be/cosic/events/secsi2020/2021/10/12/ahmad-reza-sadeghi-tu-darmstadt-trusting-the-trust-anchor-the-struggle-and-challenges-of-trusted-computing/ Accessed 23 Nov, 2021
3. Anderson R (2020) Security engineering: a guide to building dependable distributed systems, 3rd edn. Wiley, Hoboken, pp 1–1232
4. Arthur W, Challener D (2015) A practical guide to TPM 2.0: using the new trusted platform module in the new age of security. Apress, Berkeley, CA
5. Birkholz H, Thaler D, Richardson M, Smith N, Pan W (2023) Remote ATtestation procedureS (RATS) Architecture. RFC Editor. https://doi.org/10.17487/RFC9334. https://www.rfc-editor.org/info/rfc9334
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献