Confidential Computing: Principles and Technology
Autor Jiewen Yaoen Limba Engleză Paperback – sep 2026
Confidential Computing: Principles and Technology comprehensively introduces the design principles and usage methods of TEE in terms of security models, lifecycle, attestation models, attack methods, and mitigation strategies, helping readers understand the security attributes and implementation points of confidential computing. At the same time, this book takes the TEE provided by the mainstream X86, ARM, and RISC-V architectures in the industry as examples to analyze the specific implementation methods and similarities and differences of hardware TEE, helping users deeply understand the advantages and disadvantages of different implementations, and hoping to provide some inspiration for future TEE software and hardware designers.
- Provides a common confidential computing TEE model and principles
- Covers different solutions, including X86 (SGX, TDX, SEV), ARM and RISC-V
- Includes different attacks and mitigation examples
- Reviews both TEE and advanced TEE-IO solutions, including industry standards on TCG, DMTF, PCI, CXL
Preț: 735.99 lei
Preț vechi: 919.98 lei
-20% Precomandă
Puncte Express: 1104
Carte nepublicată încă
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Specificații
ISBN-13: 9780443540677
ISBN-10: 0443540675
Pagini: 250
Dimensiuni: 152 x 229 mm
Editura: ELSEVIER SCIENCE
ISBN-10: 0443540675
Pagini: 250
Dimensiuni: 152 x 229 mm
Editura: ELSEVIER SCIENCE
Cuprins
1. Introduction to Privacy Computing
2. Introduction to Confidential Computing
3. Confidential Computing Model
4. TEE Lifecycle
5. TEE Attestation Model
6. TEE Special Function
7. Software Development
8. TEE Attack and Mitigation
9. Confidential Computing TEE-IO Model
10. TEE-IO Life Cycle
11. TEE-IO Attestation Model
12. TEE-IO Special Function
13. TEE-IO Software Development
14. TEE-IO Attack and Mitigation
2. Introduction to Confidential Computing
3. Confidential Computing Model
4. TEE Lifecycle
5. TEE Attestation Model
6. TEE Special Function
7. Software Development
8. TEE Attack and Mitigation
9. Confidential Computing TEE-IO Model
10. TEE-IO Life Cycle
11. TEE-IO Attestation Model
12. TEE-IO Special Function
13. TEE-IO Software Development
14. TEE-IO Attack and Mitigation