[Teep] I-D Action: draft-ietf-teep-usecase-for-cc-in-network-03.txt
internet-drafts@ietf.org Mon, 17 April 2023 11:21 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: teep@ietf.org
Delivered-To: teep@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id CAC24C151531; Mon, 17 Apr 2023 04:21:14 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: teep@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 10.0.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: teep@ietf.org
Message-ID: <168173047481.59203.3773301283990445435@ietfa.amsl.com>
Date: Mon, 17 Apr 2023 04:21:14 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/O0bSBSjqDbbw8IosnXetRr4jJ9k>
Subject: [Teep] I-D Action: draft-ietf-teep-usecase-for-cc-in-network-03.txt
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.39
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Apr 2023 11:21:14 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This Internet-Draft is a work item of the Trusted Execution Environment Provisioning (TEEP) WG of the IETF. Title : TEEP Usecase for Confidential Computing in Network Authors : Penglin Yang Meiling Chen Li Su Ting Pang Filename : draft-ietf-teep-usecase-for-cc-in-network-03.txt Pages : 12 Date : 2023-04-17 Abstract: Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment. Confidential computing could provide integrity and confidentiality for users who want to run applications and process data in that environment. When confidential computing is used in scenarios which need network to provision user data and applications in the TEE environment, TEEP architecture[I-D.ietf-teep-architecture] and protocol [I-D.ietf-teep-protocol] could be used. This document focuses on using TEEP to provision Network User data and applications in confidential computing. This document is a use case and extension of TEEP and could provide guidance for cloud computing, [MEC] and other scenarios to use confidential computing in network. The IETF datatracker status page for this Internet-Draft is: https://datatracker.ietf.org/doc/draft-ietf-teep-usecase-for-cc-in-network/ There is also an HTML version available at: https://www.ietf.org/archive/id/draft-ietf-teep-usecase-for-cc-in-network-03.html A diff from the previous version is available at: https://author-tools.ietf.org/iddiff?url2=draft-ietf-teep-usecase-for-cc-in-network-03 Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
- [Teep] I-D Action: draft-ietf-teep-usecase-for-cc… internet-drafts