Introducing an easy-to-use platform to unleash the potential of confidential information

MC² computing service stack in Microsoft Azure (Figure

Use cases

What are protected enclaves?

Protects enclaves compared to other approaches

How protected enclaves are compared to other privacy enhancing technologies (Image by author)
The overall workflow of a job in progress in the MC² stack. Trusted components are green, while unreliable ones are red. (Picture

Research prototypes


Please enter your comment!
Please enter your name here