[Teep] I-D Action: draft-ietf-teep-usecase-for-cc-in-network-01.txt
internet-drafts@ietf.org Fri, 14 October 2022 03:30 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: teep@ietf.org
Delivered-To: teep@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 952A9C1522A8; Thu, 13 Oct 2022 20:30:08 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: teep@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 8.17.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: teep@ietf.org
Message-ID: <166571820859.49517.14207651229777101644@ietfa.amsl.com>
Date: Thu, 13 Oct 2022 20:30:08 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/bCts6iqA29sjVp-oQeuGGUDR6fU>
Subject: [Teep] I-D Action: draft-ietf-teep-usecase-for-cc-in-network-01.txt
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.39
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Oct 2022 03:30:08 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Trusted Execution Environment Provisioning WG of the IETF. Title : TEEP Usecase for Confidential Computing in Network Authors : Penglin Yang Meiling Chen Li Su Ting Pang Filename : draft-ietf-teep-usecase-for-cc-in-network-01.txt Pages : 13 Date : 2022-10-13 Abstract: Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment. Confidential computing could provide integrity and confidentiality for users who want to run applications and process data in that environment. When confidential computing is used in scenarios which need network to provision users' data and applications in the TEE environment, TEEP architecture[I-D.ietf-teep-architecture] and protocol[I-D.ietf-teep-protocol] could be used. This document focuses on using TEEP to provision network users' data and applications in confidential computing. This document is a use case and extension of TEEP and could provide guidance for cloud computing, MEC[MEC] and other scenarios to use confidential computing in network. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-teep-usecase-for-cc-in-network/ There is also an htmlized version available at: https://datatracker.ietf.org/doc/html/draft-ietf-teep-usecase-for-cc-in-network-01 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-teep-usecase-for-cc-in-network-01 Internet-Drafts are also available by rsync at rsync.ietf.org::internet-drafts
- [Teep] I-D Action: draft-ietf-teep-usecase-for-cc… internet-drafts