The project has been moved to CC-API organization. For more information:
☆25Apr 15, 2024Updated last year
Alternatives and similar repositories for confidential-cloud-native-primitives
Users that are interested in confidential-cloud-native-primitives are comparing it to the libraries listed below
Sorting:
- AI cloud native pipeline for confidential and sustainable computing☆39Aug 4, 2025Updated 7 months ago
- Build Trusted Chain for Cloud Native in Confidential Computing Envrionment☆19Feb 25, 2025Updated last year
- Unified API to Access TCG Compliant measurement, event log, quote in Confidential Computing Environment.☆38Nov 6, 2024Updated last year
- VMSDK implements the Evidence API☆11Nov 25, 2024Updated last year
- ☆42Sep 4, 2025Updated 6 months ago
- The Intel® Software Guard Extensions Enclave Memory Manager is a module designed to manage dynamic memory within an SGX runtime.☆29Jan 13, 2026Updated 2 months ago
- ☆32Mar 4, 2026Updated 2 weeks ago
- ☆33Dec 6, 2022Updated 3 years ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆52Updated this week
- Documentation related to Intel's Confidential Computing offerings☆21Mar 13, 2026Updated last week
- PrivacyGo Data Clean Room (PGDCR) is an open-source project for easily building and deploying data collaboration framework to the cloud u…☆35Oct 31, 2024Updated last year
- ☆35Oct 29, 2025Updated 4 months ago
- An End-to-End Distributed and Scalable Cloud KMS (Key Management System) built on top of Intel SGX enclave-based HSM (Hardware Security M…☆169Jul 25, 2024Updated last year
- ☆93Updated this week
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆100Aug 13, 2025Updated 7 months ago
- RATS Architecture☆17Oct 27, 2025Updated 4 months ago
- Native Linux KVM tool☆12Feb 4, 2026Updated last month
- Generic Attestation Service☆44Nov 20, 2023Updated 2 years ago
- ☆10Dec 8, 2021Updated 4 years ago
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆17Nov 15, 2022Updated 3 years ago
- A python program used to gain access to computers running Secure Shell via dictionary attack.☆11Nov 20, 2017Updated 8 years ago
- A program to shred files and folders securely☆11Apr 9, 2016Updated 9 years ago
- ☆12Feb 14, 2026Updated last month
- 🥦2018华为软件精英挑战赛☆10Aug 12, 2018Updated 7 years ago
- ☆21Sep 9, 2024Updated last year
- ☆13Mar 14, 2026Updated last week
- Pepc - Power, Energy, and Performance Configurator☆63Mar 4, 2026Updated 2 weeks ago
- Intel confidential computing - TDX☆247Feb 13, 2026Updated last month
- tf-trusted allows you to run TensorFlow models in secure enclaves☆87Jul 23, 2020Updated 5 years ago
- HyperEnclave is an open and cross-platform trusted execution environment.☆71Jan 21, 2025Updated last year
- Known vulnerability scanning for your GitHub repository using CVE Binary Tool. This Action can scan binaries, component lists and SBOMs …☆15Oct 20, 2025Updated 5 months ago
- EDK II new feature staging☆174Mar 12, 2026Updated last week
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 5 months ago
- PM Workshop China☆10Apr 11, 2019Updated 6 years ago
- Documentation for the confidential containers project☆74Jul 20, 2023Updated 2 years ago
- Read only mirror for Hafnium☆22Mar 3, 2026Updated 2 weeks ago
- ☆20Nov 27, 2025Updated 3 months ago
- SPDK fork of nvme-cli. No longer supported - use standard nvme-cli with SPDK nvme CUSE instead. See https://spdk.io/doc/nvme.html#nvme_…☆15Apr 10, 2024Updated last year
- Open Enclave port of the ONNX runtime for confidential inferencing on Azure Confidential Computing☆37Dec 12, 2022Updated 3 years ago