{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T22:43:24Z","timestamp":1774219404244,"version":"3.50.1"},"reference-count":11,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T00:00:00Z","timestamp":1727308800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:p>Attestation and verification are integral to adopting confidential computing.<\/jats:p>","DOI":"10.1145\/3685700","type":"journal-article","created":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T18:16:46Z","timestamp":1727288206000},"page":"34-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Elevating Security with Arm CCA"],"prefix":"10.1145","volume":"67","author":[{"given":"Charles","family":"Garcia-Tobin","sequence":"first","affiliation":[]},{"given":"Mark","family":"Knight","sequence":"additional","affiliation":[{"name":"Arm, London, England, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,9,26]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Ali O. and Osmanaj V. The role of government regulations in the adoption of cloud computing: A case study of local government. Computer Law & Security Rev. 36 (2020);\u00a0https:\/\/bit.ly\/4dGyXTw","DOI":"10.1016\/j.clsr.2020.105396"},{"key":"e_1_3_1_3_2","unstructured":"Arm Developer. Arm architecture reference manual for A-Profile Architecture;\u00a0https:\/\/bit.ly\/4fAuUdr"},{"key":"e_1_3_1_4_2","unstructured":"Arm Developer. Arm System Memory Management Unit Architecture specification;\u00a0https:\/\/bit.ly\/3SK7iZU"},{"key":"e_1_3_1_5_2","unstructured":"Arm Developer. Learn the architecture: Introducing Arm Confidential Compute Architecture;\u00a0https:\/\/bit.ly\/3WKBPYI"},{"key":"e_1_3_1_6_2","unstructured":"Confidential Computing Consortium;\u00a0https:\/\/bit.ly\/3SKIHV1"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"Delignat-Lavaud A. et al. Why should I trust your code?\u00a0ACM Queue 21 4 (2023);\u00a0https:\/\/bit.ly\/4dF2rkD","DOI":"10.1145\/3623460"},{"key":"e_1_3_1_8_2","unstructured":"Li X. et al. Design and verification of the Arm Confidential Compute Architecture. In Proceedings of the 16th Usenix Symp. on Operating Systems Design and Implementation (2022) 465\u2013484;\u00a0https:\/\/bit.ly\/4fFatfo"},{"key":"e_1_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Russinovich M. Confidential computing: Elevating cloud security and privacy. ACM Queue 21 4 (2023);\u00a0https:\/\/bit.ly\/3X1zM3K","DOI":"10.1145\/3623461"},{"key":"e_1_3_1_10_2","unstructured":"Scott H.S. et al. Cloud computing in the financial sector: A global perspective. Program on Intern. Financial Systems (2019);\u00a0https:\/\/bit.ly\/3X1zM3K"},{"key":"e_1_3_1_11_2","unstructured":"Trusted Firmware;\u00a0https:\/\/bit.ly\/3SL3o2R and\u00a0https:\/\/bit.ly\/3YBEPJD"},{"key":"e_1_3_1_12_2","unstructured":"Tschofenig H. et al. Using attestation in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). IETF Datatracker (2023);\u00a0https:\/\/bit.ly\/4djKetk"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685700","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3685700","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:26Z","timestamp":1750295846000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3685700"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,26]]},"references-count":11,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["10.1145\/3685700"],"URL":"https:\/\/doi.org\/10.1145\/3685700","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,26]]},"assertion":[{"value":"2024-09-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}