Build Trusted Chain for Cloud Native in Confidential Computing Envrionment
☆20Feb 25, 2025Updated last year
Alternatives and similar repositories for container-integrity-measurement-agent
Users that are interested in container-integrity-measurement-agent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The project has been moved to CC-API organization. For more information:☆25Apr 15, 2024Updated 2 years ago
- Unified API to Access TCG Compliant measurement, event log, quote in Confidential Computing Environment.☆38Nov 6, 2024Updated last year
- AI cloud native pipeline for confidential and sustainable computing☆39Aug 4, 2025Updated 9 months ago
- VMSDK implements the Evidence API☆11Nov 25, 2024Updated last year
- ☆32Mar 24, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆13Apr 3, 2026Updated last month
- ☆13Apr 8, 2026Updated 3 weeks ago
- PrivacyGo Data Clean Room (PGDCR) is an open-source project for easily building and deploying data collaboration framework to the cloud u…☆35Oct 31, 2024Updated last year
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆29Jan 13, 2026Updated 3 months ago
- ☆37Oct 29, 2025Updated 6 months ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆54Apr 28, 2026Updated last week
- Documentation for the confidential containers project☆74Jul 20, 2023Updated 2 years ago
- ☆32Dec 6, 2022Updated 3 years ago
- Confidential Containers Guest Tools and Components☆121Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆73Feb 11, 2026Updated 2 months ago
- Documentation related to Intel's Confidential Computing offerings☆24Mar 13, 2026Updated last month
- ☆22Feb 13, 2024Updated 2 years ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆100Updated this week
- Confidential VM Platform Guest attestation sample apps☆83Apr 27, 2026Updated last week
- Coq code formatter☆24Jan 22, 2026Updated 3 months ago
- ☆59Mar 26, 2025Updated last year
- IETF RATS terms cheat sheet☆12Feb 4, 2023Updated 3 years ago
- ☆11Dec 20, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Stress-SGX is a fork of stress-ng that allows to put Intel SGX enclaves under high load.☆16Aug 21, 2018Updated 7 years ago
- Interfaces between SGX SDKs and the Azure Attestation SGX Certification Cache.☆67Apr 10, 2026Updated 3 weeks ago
- Intel confidential computing - TDX☆262Apr 16, 2026Updated 2 weeks ago
- ☆77Jan 7, 2023Updated 3 years ago
- Microsoft Azure Attestation is a solution for attesting Trusted Execution Environments (TEEs)☆35Apr 10, 2025Updated last year
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆33May 3, 2024Updated 2 years ago
- Solidity Implementation of On-Chain PCCS used for Intel DCAP Attestations☆17Mar 24, 2026Updated last month
- Adds server Waf support to your application for CTFer.☆11Sep 30, 2018Updated 7 years ago
- An on-device confidential computing platform☆136Apr 27, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- EDK II new feature staging☆177Apr 16, 2026Updated 2 weeks ago
- The fastest abstract rate limiter.☆11Nov 10, 2022Updated 3 years ago
- P4Control: Line-Rate Cross-Host Attack Prevention via In-Network Information Flow Control Enabled by Programmable Switches and eBPF☆11May 20, 2024Updated last year
- Collection of resources on Confidential Computing☆35Apr 18, 2026Updated 2 weeks ago
- A migration for the page table entry based side-channel attack agains SGX enclaves.☆19Feb 10, 2025Updated last year
- ☆46Oct 20, 2025Updated 6 months ago
- List of crypto mining pools.☆14Apr 30, 2018Updated 8 years ago