The project has been moved to CC-API organization. For more information:
☆25Apr 15, 2024Updated last year
Alternatives and similar repositories for confidential-cloud-native-primitives
Users that are interested in confidential-cloud-native-primitives are comparing it to the libraries listed below
Sorting:
- AI cloud native pipeline for confidential and sustainable computing☆39Aug 4, 2025Updated 6 months ago
- Build Trusted Chain for Cloud Native in Confidential Computing Envrionment☆19Feb 25, 2025Updated last year
- Unified API to Access TCG Compliant measurement, event log, quote in Confidential Computing Environment.☆38Nov 6, 2024Updated last year
- ☆13Feb 3, 2026Updated 3 weeks ago
- VMSDK implements the Evidence API☆11Nov 25, 2024Updated last year
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆50Feb 23, 2026Updated last week
- ☆42Sep 4, 2025Updated 5 months ago
- RATS Architecture☆17Oct 27, 2025Updated 4 months ago
- Documentation related to Intel's Confidential Computing offerings☆20Feb 20, 2026Updated last week
- An End-to-End Distributed and Scalable Cloud KMS (Key Management System) built on top of Intel SGX enclave-based HSM (Hardware Security M…☆169Jul 25, 2024Updated last year
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆73Feb 11, 2026Updated 2 weeks ago
- Trust Domain Extensions (TDX) is introducing new, architectural elements to help deploy hardware-isolated, virtual machines (VMs) called …☆94Aug 13, 2025Updated 6 months ago
- Open Enclave port of the ONNX runtime for confidential inferencing on Azure Confidential Computing☆37Dec 12, 2022Updated 3 years ago
- tf-trusted allows you to run TensorFlow models in secure enclaves☆87Jul 23, 2020Updated 5 years ago
- ☆13Feb 11, 2026Updated 2 weeks ago
- ☆12Feb 14, 2026Updated 2 weeks ago
- ☆94Updated this week
- This repository contains Dockerfiles, scripts, yaml files, Helm charts, etc. used to scale out AI containers with versions of TensorFlow …☆62Updated this week
- EDK II new feature staging☆173Feb 12, 2026Updated 2 weeks ago
- 🥦2018华为软件精英挑战赛☆10Aug 12, 2018Updated 7 years ago
- ☆10Dec 8, 2021Updated 4 years ago
- electron use n-api extend native interface.☆11Oct 6, 2020Updated 5 years ago
- Implementation of the Arm CCA attestation token in Rust☆13Sep 23, 2025Updated 5 months ago
- ☆17Feb 3, 2026Updated 3 weeks ago
- Support UEFI load☆11Oct 1, 2015Updated 10 years ago
- The libmetal module specific for use with Zephyr. This is not a mirror of the official libmetal repo.☆14Nov 6, 2025Updated 3 months ago
- ☆19Jan 28, 2026Updated last month
- Intel® AI for Enterprise Inference optimizes AI inference services on Intel hardware using Kubernetes Orchestration. It automates LLM mod…☆36Feb 20, 2026Updated last week
- Linux applications to manage, test and develop devices supporting DMTF Security Protocol and Data Model (SPDM)☆18Feb 6, 2026Updated 3 weeks ago
- IETF RATS terms cheat sheet☆12Feb 4, 2023Updated 3 years ago
- Virtio in userspace☆12Nov 8, 2011Updated 14 years ago
- Source code of the U-TRR methodology presented in "Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHamme…☆17Nov 15, 2022Updated 3 years ago
- ☆15Updated this week
- A benchmark showing that kfifo is really super fast☆11Oct 12, 2015Updated 10 years ago
- ☆321Feb 17, 2026Updated last week
- JTAG Tools For FTDI MPSSE Transports☆13Jul 22, 2014Updated 11 years ago
- TPM C library for use with Azure IoT SDKs☆14Jan 28, 2025Updated last year
- Known vulnerability scanning for your GitHub repository using CVE Binary Tool. This Action can scan binaries, component lists and SBOMs …☆15Oct 20, 2025Updated 4 months ago
- Intel confidential computing - TDX☆244Feb 13, 2026Updated 2 weeks ago