%% You should probably cite draft-yang-teep-usecase-for-cc-in-network instead of this I-D. @techreport{yang-teep-ccican-00, number = {draft-yang-teep-ccican-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-yang-teep-ccican/00/}, author = {Penglin Yang and Meiling Chen and Li Su}, title = {{architecture of confidential computing in computing aware network}}, pagetotal = 10, year = 2022, month = mar, day = 3, abstract = {Confidential Computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment. Especially in virtualization environments, confidential computing could protect data and applications from access or tampering by hypervisor or other privileged users. In Computing-Aware network, computing resource is an essential element to provide computing services for network users' applications. Introducing confidential computing in Computing-Aware network could mitigate the distrust of computing resource efficiently. This document provides the architecture of confidential computing in Computing-Aware network management plane to provide confidentiality and integrity for applications.}, }