{"draft":"draft-ietf-teep-architecture-19","doc_id":"RFC9397","title":"Trusted Execution Environment Provisioning (TEEP) Architecture","authors":["M. Pei","H. Tschofenig","D. Thaler","D. Wheeler"],"format":["HTML","TEXT","PDF","XML"],"page_count":"31","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Trusted Execution Environment Provisioning","abstract":"A Trusted Execution Environment (TEE) is an environment that enforces\r\nthe following: any code within the environment cannot be tampered\r\nwith, and any data used by such code cannot be read or tampered with\r\nby any code outside the environment. This architecture document\r\ndiscusses the motivation for designing and standardizing a protocol\r\nfor managing the lifecycle of Trusted Applications running inside\r\nsuch a TEE.","pub_date":"July 2023","keywords":["trusted application","trusted component","TEE","trust anchor","TAM","confidential computing"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC9397","errata_url":null}