{"id":438593,"date":"2024-10-20T08:04:29","date_gmt":"2024-10-20T08:04:29","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-2952-2023-2\/"},"modified":"2024-10-26T15:08:34","modified_gmt":"2024-10-26T15:08:34","slug":"ieee-2952-2023-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-2952-2023-2\/","title":{"rendered":"IEEE 2952-2023"},"content":{"rendered":"
New IEEE Standard – Active. A framework of TEE-based secure computing system, and technical requirements of a general secure computing platform for isolation, confidentiality, compatibility, performance, usability, and security aspects are specified in this standard. Use cases and scenarios of secure computing technology are also specified.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | IEEE Std 2952\u2122-2023 Front cover <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | Title page <\/td>\n<\/tr>\n | ||||||
4<\/td>\n | Important Notices and Disclaimers Concerning IEEE Standards Documents <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Participants <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | Contents <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 1.\u2002Overview 1.1\u2002Scope 1.2\u2002Word usage 2.\u2002Normative references <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 3.\u2002Definitions, acronyms, and abbreviations 3.1\u2002Definitions 3.2\u2002Acronyms and abbreviations 4.\u2002Technical framework 4.1\u2002Architecture framework <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 4.2\u2002Layered functionalities <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.\u2002Functional components 5.1\u2002Fundamental layer <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.2\u2002Platform layer <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.3\u2002Application layer <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.4\u2002Service layer <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.5\u2002Cross-layer functions <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 6.\u2002Reference process of secure computing <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 7.\u2002Technical and security requirements 7.1\u2002Isolation requirements <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 7.2\u2002Interoperability requirements 7.3\u2002Performance requirements <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 7.4\u2002Availability requirements 7.5\u2002Data security requirements 7.6\u2002Cryptography requirements <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | Annex\u00a0A (informative) Introduction of popular TEEs <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex\u00a0B (informative) Introduction of popular TEE LibOS <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex\u00a0C (informative) Bibliography <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Back cover <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" IEEE Standard for Secure Computing Based on Trusted Execution Environment (Approved Draft)<\/b><\/p>\n |