Difference between revisions of "Confidential computing"
Jump to navigation
Jump to search
m (Welcome moved page Confidential Computing to Confidential computing) |
|||
(5 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | + | [[wikipedia:Confidential computing]] | |
+ | |||
+ | * [[Trusted execution environment (TEE)]] | ||
+ | * [[Confidential Computing Consortium (CCC)]] | ||
+ | * [[Trusted computing base (TCB)]] | ||
+ | |||
+ | |||
+ | * [[Trusted Computing]] | ||
+ | |||
+ | == See also == | ||
+ | * {{Hype Cycle}} | ||
+ | * {{Gartner}} | ||
+ | |||
+ | [[Category:Gartner]] | ||
+ | [[Category:Security]] |
Latest revision as of 09:53, 1 August 2023
wikipedia:Confidential computing
- Trusted execution environment (TEE)
- Confidential Computing Consortium (CCC)
- Trusted computing base (TCB)
See also[edit]
- Hype Cycle, Hype cycle for cloud security
- Research and analisys, Market Intelligence: Gartner, Gartner Magic Quadrant, Gartner hype cycle, Gartner Market Guide, Forrester: Forrester Wave, IDC, 451 Research, CB Insights, G2 Crowd, SIEM Magic Quadrant, Privileged Access Management, Nielsen, 451 Group (451 research), Gartner Cool Vendors in Cloud Computing, Capterra
Advertising: