@techreport{ietf-teep-usecase-for-cc-in-network-07, number = {draft-ietf-teep-usecase-for-cc-in-network-07}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-ietf-teep-usecase-for-cc-in-network/07/}, author = {Penglin Yang and Meiling Chen and Li Su and Ting Pang}, title = {{TEEP Usecase for Confidential Computing in Network}}, pagetotal = 13, year = 2024, month = jun, day = 21, abstract = {Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment. Confidential computing could provide integrity and confidentiality for users who want to run applications and process data in that environment. When confidential computing is used in scenarios which need network to provision user data and applications, TEEP architecture and protocol could be used. This usecase illustrates the steps of how to deploy applications, containers, VMs and data in different confidential computing hardware in network. This document is a use case and extension of TEEP architecture and could provide guidance for cloud computing, MEC and other scenarios to use confidential computing in network.}, }