Skip to content

Commit

Permalink
update md file
Browse files Browse the repository at this point in the history
Signed-off-by: Jinbum Park <jinb.park@samsung.com>
  • Loading branch information
jinbpark committed Jun 26, 2023
1 parent f21f347 commit 14b65d7
Show file tree
Hide file tree
Showing 4 changed files with 8 additions and 2 deletions.
6 changes: 6 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,3 +52,9 @@ Where :
---

For more information, please visit our [developer site](https://samsung.github.io/islet/).

## A demo video (Confidential ML)

![this page](./examples/confidential-ml/video/confidential_ml.gif).

See [this page](./examples/confidential-ml/README.md) to get details about this demo.
2 changes: 1 addition & 1 deletion doc/components/attestation.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,4 +22,4 @@ For example, what tokens in a report say is basically sort of measurements signe
As you may notice, managing Policy is out of scope of CCA as this is inherently not dependent on CCA. Instead, there are several open-source projects that take on this capability, for example, [Veraison](https://github.com/veraison/) and [Certifier Framework](https://github.com/vmware-research/certifier-framework-for-confidential-computing/). They all aim to implement a standardized way to express and enforce Policy. (note that they sometimes are treated as a unified verification service as they are able to work across various TEEs)

ISLET might be able to work with any verification service in theory, but currently bases the ability to handle Policy on Certifier Framework.
You can see further details [here](TODO: link to certifier) on what Certifier Framework is and how ISLET uses it.
You can see further details [here](./certifier.md) on what Certifier Framework is and how ISLET uses it.
2 changes: 1 addition & 1 deletion doc/components/certifier.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,4 +20,4 @@ From that point on, they can trust each other and send messages to each other se
## A more complex example

For a more realistic case, we've built Confidential ML on top of the certifier framework.
See [this page](TODO: Link) to know what it is in more depth.
See [this page](../usecases/confidential_ml.md) to know what it is in more depth.
Binary file modified examples/confidential-ml/video/confidential_ml.gif
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 14b65d7

Please sign in to comment.