Journal: ACM Queue

Volume 22, Issue 2

0 -- 0Charles Garcia-Tobin, Mark Knight. Elevating Security with Arm CCA: Attestation and verification are integral to adopting confidential computing
0 -- 0Thomas A. Limoncelli. Make Two Trips: Larry David's New Year's resolution works for IT too
0 -- 0Raluca Ada Popa. Confidential Computing or Cryptographic Computing?: Tradeoffs between cryptography and hardware enclaves
0 -- 0Matthew A. Johnson, Stavros Volos, Ken Gordon, Sean T. Allen, Christoph M. Wintersteiger, Sylvan Clebsch, John Starks, Manuel Costa. Confidential Container Groups: Implementing confidential computing on Azure container instances
0 -- 0Jinnan Guo, Peter R. Pietzuch, Andrew Paverd, Kapil Vaswani. Trustworthy AI using Confidential Federated Learning: Federated learning and confidential computing are not competing technologies
0 -- 0George V. Neville-Neil. Structuring Success: The problem with software structure is people don't really learn it until they really need it
0 -- 0Terence Kelly. Zero Tolerance for Bias