Software that operates on our data is assumed to be curious or malicious. To make matters worse, the cloud service provider can also be malicious and can run whatever program it wants on our data. Therefore, to be secure no private data can be allowed outside the processor without being encrypted first; and the processor must be architected in such a way that from the view of an external observer (humans, equipment, or software), the processor does not divulge anything about the private data that lies within. The Ascend processor attempts to achieve these goals; the only entity that the client has to trust is the processor itself.
|Original language||English (US)|
|Number of pages||2|
|Journal||IEEE Design and Test|
|State||Published - 2013|
ASJC Scopus subject areas
- Hardware and Architecture
- Electrical and Electronic Engineering