Table of Contents
2. Trusted Execution Environments
3. Secure Application Development
4. Remote Attestation
5. Confidential Computing in Cloud
6. Confidential Artificial Intelligence
7. Prospects of Confidential Computing
Appendix A: Enclave Initialization Instructions in Intel SGX
Appendix B: Intel TDX Architectural Instructions
Appendix C: Secure Boot Infrastructure Terminologies