Skip to main content

TEEP Usecase for Confidential Computing in Network
draft-yang-teep-usecase-for-cc-in-network-01

Document Type Replaced Internet-Draft (candidate for teep WG)
Expired & archived
Authors Penglin Yang , Meiling Chen , Li Su , Ting Pang
Last updated 2022-08-03 (Latest revision 2022-08-02)
Replaces draft-yang-teep-ccican
Replaced by draft-ietf-teep-usecase-for-cc-in-network
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status (None)
Formats
Additional resources Mailing list discussion
Stream WG state Call For Adoption By WG Issued
Document shepherd (None)
IESG IESG state Replaced by draft-ietf-teep-usecase-for-cc-in-network
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment. Confidential computing could provide integrity and confidentiality for users who want to run application and process data in that environment. When confidential computing is used in network like MEC and CAN which provide computing resource to network users, TEEP protocol could be used to provision network user's data and application in TEE environment in confidential computing resource. This document focuses on using TEEP to provision network user's data and application in confidential computing in such network. This document is a use case and extension of TEEP and could provide guidance for MEC, CAN and other scenarios to use confidential computing.

Authors

Penglin Yang
Meiling Chen
Li Su
Ting Pang

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)