• Home
  • Projects
  • Blog
  • About

Keylime: Using TPM to Secure Your Slice of the Cloud

by Andrew Toth, Luke Hinds | Jun 25, 2019 | Trust

As people move workloads to shared and public cloud environments, what methods are available to attest their environment has not been tampered with? Is there a good way to use a standardized cryptographic module to do remote attestation, trusted system boot, and so...

Categories

  • AI
  • Developer Productivity
  • Edge Computing
  • Hybrid Cloud
  • Sustainability
  • Trust
Privacy statement
Terms of use
All policies and guidelines
About

Copyright © 2021-2023 Red Hat, Inc.