Learn Excel & Financial Modeling the Way Finance Teams Actually Use Them
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This talk explores the design space, security and performance tradeoffs of attested TLS protocols, which are essential for confidential computing solutions. Discover the ongoing standardization efforts in the IETF for these protocols and learn about the security properties required from attestation frameworks. See how formalization can help achieve strong security guarantees in confidential computing environments. Gain valuable best practices for implementing attested TLS specifically to enhance the Arm CCA (Confidential Computing Architecture) ecosystem. The presentation provides insights for developers and security professionals working with confidential computing technologies.
Syllabus
LIS25 228 Attested TLS design space, tradeoffs and standardization
Taught by
LinaroOrg