<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.tschofenig-teep-protocol" target="https://datatracker.ietf.org/doc/html/draft-tschofenig-teep-protocol-01">
   <front>
      <title>Trusted Execution Environment Provisioning Protocol (teep-p)</title>
      <author initials="H." surname="Tschofenig" fullname="Hannes Tschofenig">
         <organization>Arm Ltd.</organization>
      </author>
      <author initials="M." surname="Pei" fullname="Mingliang Pei">
         <organization>Broadcom</organization>
      </author>
      <author initials="D. M." surname="Wheeler" fullname="Dave Wheeler">
         <organization>Intel</organization>
      </author>
      <author initials="D." surname="Thaler" fullname="Dave Thaler">
         <organization>Microsoft</organization>
      </author>
      <date month="November" day="17" year="2019" />
      <abstract>
	 <t>   This document specifies a protocol that installs, updates, and
   deletes Trusted Applications (TAs) in a device with a Trusted
   Execution Environment (TEE).  This specification defines an
   interoperable protocol for managing the lifecycle of TAs.

   The protocol name is teep-p, pronounced teepee.  This conjures an
   image of a wedge-shaped protective covering for one&#x27;s belongings,
   which sort of matches the intent of this protocol.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-tschofenig-teep-protocol-01" />
   
</reference>
