[Teep] I-D Action: draft-ietf-teep-usecase-for-cc-in-network-07.txt

internet-drafts@ietf.org Fri, 21 June 2024 07:36 UTC

Return-Path: <internet-drafts@ietf.org>
X-Original-To: teep@ietf.org
Delivered-To: teep@ietfa.amsl.com
Received: from [10.244.2.31] (unknown [104.131.183.230]) by ietfa.amsl.com (Postfix) with ESMTP id 3265FC180B44; Fri, 21 Jun 2024 00:36:25 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 12.16.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <171895538484.58092.5509943751467347447@dt-datatracker-6cc478f489-rscq2>
Date: Fri, 21 Jun 2024 00:36:24 -0700
Message-ID-Hash: 5TYQIDLNZJ6CK3FLZ7XQMIZV7O3WZAAG
X-Message-ID-Hash: 5TYQIDLNZJ6CK3FLZ7XQMIZV7O3WZAAG
X-MailFrom: internet-drafts@ietf.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-teep.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: teep@ietf.org
X-Mailman-Version: 3.3.9rc4
Reply-To: teep@ietf.org
Subject: [Teep] I-D Action: draft-ietf-teep-usecase-for-cc-in-network-07.txt
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/Y5daT6YvLxU8DdZEOJ7mbBAV1NA>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Owner: <mailto:teep-owner@ietf.org>
List-Post: <mailto:teep@ietf.org>
List-Subscribe: <mailto:teep-join@ietf.org>
List-Unsubscribe: <mailto:teep-leave@ietf.org>

Internet-Draft draft-ietf-teep-usecase-for-cc-in-network-07.txt is now
available. It is a work item of the Trusted Execution Environment Provisioning
(TEEP) WG of the IETF.

   Title:   TEEP Usecase for Confidential Computing in Network
   Authors: Penglin Yang
            Meiling Chen
            Li Su
            Ting Pang
   Name:    draft-ietf-teep-usecase-for-cc-in-network-07.txt
   Pages:   13
   Dates:   2024-06-21

Abstract:

   Confidential computing is the protection of data in use by performing
   computation in a hardware-based Trusted Execution Environment.
   Confidential computing could provide integrity and confidentiality
   for users who want to run applications and process data in that
   environment.  When confidential computing is used in scenarios which
   need network to provision user data and applications, TEEP
   architecture and protocol could be used.  This usecase illustrates
   the steps of how to deploy applications, containers, VMs and data in
   different confidential computing hardware in network.  This document
   is a use case and extension of TEEP architecture and could provide
   guidance for cloud computing, MEC and other scenarios to use
   confidential computing in network.

The IETF datatracker status page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-teep-usecase-for-cc-in-network/

There is also an HTMLized version available at:
https://datatracker.ietf.org/doc/html/draft-ietf-teep-usecase-for-cc-in-network-07

A diff from the previous version is available at:
https://author-tools.ietf.org/iddiff?url2=draft-ietf-teep-usecase-for-cc-in-network-07

Internet-Drafts are also available by rsync at:
rsync.ietf.org::internet-drafts