Trusted Execution Environment Provisioning (TEEP) Architecture
draft-ietf-teep-architecture-00

The information below is for an old version of the document
Document Type None Internet-Draft (teep WG)
Last updated 2018-07-04
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized bibtex
Additional URLs
- Mailing list discussion
Stream WG state (None) (wg milestones: Mar 2018 - Adopt an Architectur..., Dec 2019 - Begin WGLC for Archi..., Apr 2020 - Progress Architectur... )
Document shepherd No shepherd assigned
IESG IESG state Unknown state
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-teep-architecture-00.txt

Abstract

A Trusted Execution Environment (TEE) was designed to provide a hardware-isolation mechanism to separate a regular operating system from security- sensitive applications. This architecture document motivates the design and standardization of a protocol for managing the lifecyle of trusted applications running inside a TEE.

Authors

Mingliang Pei (Mingliang_Pei@symantec.com)
Hannes Tschofenig (hannes.tschofenig@arm.com)
Andrew Atyeo (andrew.atyeo@intercede.com)
Dapeng Liu (maxpassion@gmail.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)