Establishing Security with Trusted Execution Technology Architecture

Establishing Security with Trusted Execution Technology Architecture

A key component in trusted computing is the Trusted Execution Technology architecture. By defining protocols for communication between partitions as well as application execution, TET can help ensure that security is enforced. As with all standards, though, TET only provides the protocols and framework to fulfill trust requirements. The responsibility lies with the creators and users of the system to properly implement and use the features inherent TET.

This article comes from the upcoming book, Building Trust, Visibility and Control in the Datacenter, due out later this year. Grow your mind with Intel.


Update your feed preferences