Summary
                        
        
                            This deliverable consists of the design and implementation of multi-tenant isolation techniques for cloud systems that can be used in combination with existing application-level methods and leverage (i) OS-and system-based isolation primitives, to enable a second set of security controls, and/or (ii) existing dedicated security hardware (e.g., Trusted Platform Modules, Hardware Security Modules) and existing or new Trusted Execution Environments (TEEs) that are built upon the latter
                    
    
        
                                 
                    More information & hyperlinks
                        
         
                             
                             
                            