Hiding Attestation with Linux Keyring in Confidential Virtual Machines
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the concept of hiding attestation with Linux Keyring in Confidential Virtual Machines in this 36-minute conference talk by Mikko Ylinen from Intel. Delve into the fundamentals of confidential computing (CC) and its crucial feature of remote attestation for trusted execution environments (TEEs). Learn how Linux Keyring can be leveraged to seamlessly integrate attestation into existing workloads without disrupting them. Discover the potential of this approach through practical examples, including filesystem encryption key provisioning and attestation token provisioning. Gain insights into streamlining the adoption of confidential computing and enhancing security measures for application data processing in TEEs.
Syllabus
Hiding Attestation with Linux Keyring in Confidential Virtual Machines - Mikko Ylinen, Intel
Taught by
Linux Foundation
Tags
Related Courses
Emerging Technologies CapstoneYonsei University via Coursera Microsoft Azure Virtual Machines
Microsoft via edX Introduction to Microsoft Azure
Microsoft via edX Google Cloud Fundamentals: Core Infrastructure
Google via Coursera Build a Modern Computer from First Principles: Nand to Tetris Part II (project-centered course)
Hebrew University of Jerusalem via Coursera