Confidential Computing: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
(No difference)
| |
Hardware-enabled features that isolate and process encrypted data in memory so that the data is at less risk of exposure and compromise from concurrent workloads or the underlying system and platform.
Source: NISTIR 8320 | Category: