%% You should probably cite draft-ietf-teep-usecase-for-cc-in-network instead of this I-D. @techreport{yang-teep-usecase-for-cc-in-network-01, number = {draft-yang-teep-usecase-for-cc-in-network-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-yang-teep-usecase-for-cc-in-network/01/}, author = {Penglin Yang and Meiling Chen and Li Su and Ting Pang}, title = {{TEEP Usecase for Confidential Computing in Network}}, pagetotal = 12, year = 2022, month = aug, day = 2, abstract = {Confidential computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment. Confidential computing could provide integrity and confidentiality for users who want to run application and process data in that environment. When confidential computing is used in network like MEC and CAN which provide computing resource to network users, TEEP protocol could be used to provision network user's data and application in TEE environment in confidential computing resource. This document focuses on using TEEP to provision network user's data and application in confidential computing in such network. This document is a use case and extension of TEEP and could provide guidance for MEC, CAN and other scenarios to use confidential computing.}, }