Elevating Security with Arm CCA
RME introduces a new kind of confidential compute environment called a realm.
Elevating Security with Arm CCA
RME introduces a new kind of confidential compute environment called a realm.
Cloud computing poses challenges for systems that require confidentiality.
Trustworthy AI Using Confidential Federated Learning
Classic federated learning emphasizes security and privacy, at the cost of transparency and accountability. Confidential Federated Learning addresses this gap.
A Perspectival Mirror of the Elephant
Language bias sets a cultural barrier online and has serious implications for how Internet-based platforms reach across societal divides.
Free and Open Source Software–and Other Market Failures
Computing has scientific roots, and if it is not open source, it is not science.
From Open Access to Guarded Trust
Engineers stand at a unique confluence, where the exhilarating promise of innovation meets the sobering responsibility of trust stewardship.
Developer Ecosystems for Software Safety
Adopting and Sustaining Microservice-Based Software Development
The microservice approach to software development offers an alternative to the conventional monolith style.
Resolving the Human-Subjects Status of ML’s Crowdworkers
Device Onboarding Using FDO and the Untrusted Installer Model
Improving Testing of Deep-Learning Systems
Creating the First Confidential GPUs
Confidential Computing: Elevating Cloud Security and Privacy
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedBy opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More