Cantitate/Preț
Produs

Confidential Computing: Principles and Technology

Autor Jiewen Yao
en Limba Engleză Paperback – sep 2026
At present, major companies are launching their own confidential computing solutions, which pose significant challenges to users. This book summarizes the common designs of various mainstream TEE hardware, and explains their commonalities to help understand the working principles of TEE hardware, facilitating users to define TEE usage scenarios through abstract commonalities.

Confidential Computing: Principles and Technology comprehensively introduces the design principles and usage methods of TEE in terms of security models, lifecycle, attestation models, attack methods, and mitigation strategies, helping readers understand the security attributes and implementation points of confidential computing. At the same time, this book takes the TEE provided by the mainstream X86, ARM, and RISC-V architectures in the industry as examples to analyze the specific implementation methods and similarities and differences of hardware TEE, helping users deeply understand the advantages and disadvantages of different implementations, and hoping to provide some inspiration for future TEE software and hardware designers.

  • Provides a common confidential computing TEE model and principles
  • Covers different solutions, including X86 (SGX, TDX, SEV), ARM and RISC-V
  • Includes different attacks and mitigation examples
  • Reviews both TEE and advanced TEE-IO solutions, including industry standards on TCG, DMTF, PCI, CXL
Citește tot Restrânge

Preț: 73599 lei

Preț vechi: 91998 lei
-20% Precomandă

Puncte Express: 1104

Carte nepublicată încă

Doresc să fiu notificat când acest titlu va fi disponibil:

Specificații

ISBN-13: 9780443540677
ISBN-10: 0443540675
Pagini: 250
Dimensiuni: 152 x 229 mm
Editura: ELSEVIER SCIENCE

Cuprins

1. Introduction to Privacy Computing
2. Introduction to Confidential Computing
3. Confidential Computing Model
4. TEE Lifecycle
5. TEE Attestation Model
6. TEE Special Function
7. Software Development
8. TEE Attack and Mitigation
9. Confidential Computing TEE-IO Model
10. TEE-IO Life Cycle
11. TEE-IO Attestation Model
12. TEE-IO Special Function
13. TEE-IO Software Development
14. TEE-IO Attack and Mitigation