-
New API Review meeting has been requested.
**Service Name**: Azure Confidential Computing Ledger
**Review Created By**: Amruthashree Anekonda Matadh
**Review Date**: 09/12/2024 08:00 AM PT
**Release…
-
Over the years, we have had a number of conversations about introducing an identity mechanism to Confidential Containers. Identity is one of the most subtle parts of confidential computing, so these c…
-
So something I've been noodling on for a while is that we (and I include ASAPI in "we") are subtly coupling behavior and implementation/technology in some places. This is completely understandable giv…
-
# Summary
In the context of Confidential Computing Enablement (#1332), we break the assumption that the containers trust the host. It makes clear that the trust realms for the container workload an…
-
## CVE-2015-6420 - High Severity Vulnerability
Vulnerable Library - commons-collections4-4.0.jar
The Apache Commons Collections package contains types that extend and augment the Java Collections Fr…
-
https://ieeexplore.ieee.org/abstract/document/7345265
-
**Summary**
At GENXT, we develop security addons for Kubernetes that leverage Confidential Computing technology, which is a protection of data while it's in use in remote infrastructures by performin…
-
# Description of Project
180Protocol is building collaboration software for the next generation of enterprise. Our goal is to create a world with connected businesses, powered by the exchange of da…
-
🟡 **Topic |**
iExec Open Bounty: anyone can claim, deliver the integration, and get rewarded in RLC tokens! Full technical support offered by iExec.
🟡 **Description |**
Reward artists in cr…
-
My team develops proprietary Python packages that provides smooth access to data and models.
In order to really use Python in Excel we would need the ability to install these (from Azure Artifacts …