[Teep] I-D Action: draft-ietf-teep-usecase-for-cc-in-network-05.txt
internet-drafts@ietf.org Mon, 08 January 2024 02:56 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: teep@ietf.org
Delivered-To: teep@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 10E2FC14F739; Sun, 7 Jan 2024 18:56:55 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: teep@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 12.2.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: teep@ietf.org
Message-ID: <170468261505.5781.10636614421762290181@ietfa.amsl.com>
Date: Sun, 07 Jan 2024 18:56:55 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/QYu9fnR1ji3CKcUTiT1tJ7X4THQ>
Subject: [Teep] I-D Action: draft-ietf-teep-usecase-for-cc-in-network-05.txt
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.39
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 08 Jan 2024 02:56:55 -0000
Internet-Draft draft-ietf-teep-usecase-for-cc-in-network-05.txt is now available. It is a work item of the Trusted Execution Environment Provisioning (TEEP) WG of the IETF. Title: TEEP Usecase for Confidential Computing in Network Authors: Penglin Yang Meiling Chen Li Su Ting Pang Name: draft-ietf-teep-usecase-for-cc-in-network-05.txt Pages: 13 Dates: 2024-01-07 Abstract: Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment. Confidential computing could provide integrity and confidentiality for users who want to run applications and process data in that environment. When confidential computing is used in scenarios which need network to provision user data and applications, TEEP architecture[I-D.ietf-teep-architecture] and protocol [I-D.ietf-teep-protocol] could be used. This usecase illustrates the steps of how to deploy applications, containers, VMs and data in different confidential computing hardware in network. This document is a use case and extension of TEEP architecture and could provide guidance for cloud computing, [MEC] and other scenarios to use confidential computing in network. The IETF datatracker status page for this Internet-Draft is: https://datatracker.ietf.org/doc/draft-ietf-teep-usecase-for-cc-in-network/ There is also an HTMLized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-teep-usecase-for-cc-in-network-05 A diff from the previous version is available at: https://author-tools.ietf.org/iddiff?url2=draft-ietf-teep-usecase-for-cc-in-network-05 Internet-Drafts are also available by rsync at: rsync.ietf.org::internet-drafts
- [Teep] I-D Action: draft-ietf-teep-usecase-for-cc… internet-drafts