Patent attributes
A solution is proposed for controlling access to computing resources. A corresponding method comprises receiving and verifying an access request for accessing the computing resources by a secondary computing environment (isolated from the computing resources). A main computing environment (isolated from the secondary computing environment) detects an indication of a positive result of the verification of the access request; in response thereto, the main computing environment verifies an integrity condition of the secondary computing environment and then authorizes the secondary computing environment to access the computing resources accordingly. A computer program and a computer program product for performing the method are also proposed. Moreover, a system for implementing the method is proposed.