• Home
  • Projects
  • Blog
  • Calendar
  • About

Keylime: Using TPM to Secure Your Slice of the Cloud

by Andrew Toth, Luke Hinds | Jun 25, 2019 | Security

As people move workloads to shared and public cloud environments, what methods are available to attest their environment has not been tampered with? Is there a good way to use a standardized cryptographic module to do remote attestation, trusted system boot, and so...

Categories

  • AI / Machine Learning
  • Ansible
  • Blockchain
  • Containers
  • Developers
  • Edge Computing
  • Education
  • Hybrid Cloud
  • Internet of Things
  • Microservices
  • Networking
  • Open Source Communities
  • OpenShift
  • OpenStack
  • Quantum Computing
  • Research
  • Security
  • Serverless / FaaS
  • Storage
Privacy statement
Terms of use
All policies and guidelines
About

Copyright © 2021 Red Hat, Inc.