<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-mihalcea-seat-use-cases-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="SEAT Use Cases">Use Cases and Properties for Integrating Remote Attestation with Secure Channel Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-mihalcea-seat-use-cases-01"/>
    <author fullname="Ionuț Mihalcea">
      <organization>Arm</organization>
      <address>
        <email>ionut.mihalcea@arm.com</email>
      </address>
    </author>
    <author fullname="Muhammad Usama Sardar">
      <organization>TU Dresden</organization>
      <address>
        <email>muhammad_usama.sardar@tu-dresden.de</email>
      </address>
    </author>
    <author fullname="Thomas Fossati">
      <organization>Linaro</organization>
      <address>
        <email>thomas.fossati@linaro.org</email>
      </address>
    </author>
    <author fullname="Tirumaleswar Reddy">
      <organization>Nokia</organization>
      <address>
        <email>kondtir@gmail.com</email>
      </address>
    </author>
    <author fullname="Yuning Jiang">
      <organization/>
      <address>
        <email>jiangyuning2@h-partners.com</email>
      </address>
    </author>
    <author fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="19"/>
    <area>Security</area>
    <workgroup>SEAT Working Group</workgroup>
    <keyword>remote attestation</keyword>
    <keyword>TLS</keyword>
    <keyword>confidential computing</keyword>
    <keyword>IoT</keyword>
    <keyword>RATS</keyword>
    <abstract>
      <?line 73?>

<t>This document outlines use cases and desirable properties for integrating remote
attestation (RA) capabilities with secure channel establishment protocols, with
an initial focus on Transport Layer Security (TLS) v1.3 Handshake. Traditional
peer authentication in TLS establishes trust in a peer's network identifiers but
provides no assurance regarding the integrity of its underlying software and
hardware stack. Remote attestation addresses this gap by enabling a peer to
provide verifiable evidence about its current state, including the state of its
trusted computing base (TCB). This document explores specific use cases, such as
confidential data collaboration and secure secrets provisioning, to motivate the
need for this integration. From these use cases, it specifies a set of essential
properties the protocol solution must have, including cryptographic binding to
the TLS connection, evidence freshness, and flexibility to support different
attestation models. This document is intended to serve as an input to the design
of protocol solutions within the SEAT working group.</t>
    </abstract>
  </front>
  <middle>
    <?line 90?>

<section anchor="introduction">
      <name>Introduction</name>
      <section anchor="establishing-trust-in-secure-communications">
        <name>Establishing Trust in Secure Communications</name>
        <t>Traditional secure channel protocols, such as Transport Layer Security (TLS),
primarily establish trust in a peer's identity. This is typically achieved
through mechanisms like a Public Key Infrastructure (PKI), where a trusted
Certification Authority (CA) vouches for the binding between a public key and an
identifier (e.g., a hostname).</t>
        <t>However, this model has a core limitation: identity authentication provides no
assurance about the peer's internal state or the integrity of its software
stack. A compromised server, for instance, can still present a valid X.509
certificate and be considered "trusted" by a client. This gap allows compromised
endpoints to maintain network access and the trust of their peers, posing a
significant security risk in many environments.</t>
      </section>
      <section anchor="the-role-of-remote-attestation">
        <name>The Role of Remote Attestation</name>
        <t>Remote Attestation (RA), as described in the RATS architecture <xref target="RFC9334"/>, is a
mechanism designed to fill this gap. RA allows an entity (the "Attester") to
produce verifiable "Evidence" about its current runtime state. This Evidence
covers the Attester's TCB, and can thus include measurements of its firmware,
operating system, and application code, as well as the configuration of its
hardware and software security features (e.g., secure boot status, memory
isolation). A "Relying Party" can then use this Evidence, often with the help of
a trusted "Verifier", to appraise the Attester's trustworthiness.</t>
        <t>By integrating RA into a secure channel establishment protocol, a second
dimension of trust—trustworthiness—is added to complement regular peer
authentication. This allows a peer to make authorization decisions based not
just on who the other party is, but also on what it is (e.g., an AMD
SEV-SNP-based server running in some known datacenter) and whether its state is
acceptable.</t>
      </section>
      <section anchor="purpose-and-scope">
        <name>Purpose and Scope</name>
        <t>The purpose of this document is to outline the key use cases that motivate the
integration of RA with secure channel protocols and to establish a set of
essential properties for such an integration. The initial focus is on TLS 1.3
and its datagram-oriented variant, DTLS 1.3.</t>
        <t>This document is intended as an input to the design of protocol solutions within
the SEAT working group. It defines the "why" and the "what" (the requirements),
but not the "how" (the protocol specification itself). A key goal is to define
requirements for a solution that is agnostic to any specific attestation
technology (e.g., Trusted Platform Modules (TPMs), Intel TDX, AMD SEV, Arm CCA).</t>
      </section>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>This document uses the terminology defined in the RATS Architecture <xref target="RFC9334"/>,
including "Attester", "Relying Party", "Verifier", "Evidence", and "Attestation
Results".</t>
      <t>This document also uses the following terms:</t>
      <ul spacing="normal">
        <li>
          <t>Trusted Computing Base (TCB) of a device: all security-relevant components:
hardware, firmware, software, and their respective configurations.</t>
        </li>
        <li>
          <t>Confidential Workload: as defined in <xref target="I-D.draft-ccc-wimse-twi-extensions"/>.</t>
        </li>
        <li>
          <t>Measurements: as defined in <xref target="I-D.draft-ietf-rats-eat-measured-component"/>.</t>
        </li>
        <li>
          <t>AI agent: An AI agent is a software principal (typically long-running) that performs
closed-loop "perceive -&gt; plan -&gt; act" cycles using an LLM or other model,
and invokes external tools/APIs that may read sensitive data or change
system/network state. Its configuration (e.g., model choice, tool enablement,
prompt template) can change independently of the binary/image and usually
more frequently than typical platform TCB updates <xref target="AI-agents"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <t>This section provides the concrete motivation for the WG's work by describing
specific use cases. For each case, the scenario, actors, and specific security
guarantees needed from RA are described.</t>
      <section anchor="secure-provisioning-and-high-assurance-operations">
        <name>Secure Provisioning and High-Assurance Operations</name>
        <t>Goal: Ensure the integrity of workloads and devices when bootstrapping their
identity or receiving critical commands.</t>
        <t>Use case: Runtime Secret Provisioning: A confidential workload starts in a
generic state and needs to fetch secrets (e.g., API keys, database credentials,
encryption keys) to become operational.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The workload must attest its runtime state (TEE genuineness,
software measurements) to a secrets management service. The service will only
release the secrets after successful verification, ensuring they are delivered
exclusively to a trustworthy environment. This use-case also covers secure
device onboarding for IoT devices that lack a pre-provisioned identity.</t>
          </li>
        </ul>
        <t>Use case: High-Assurance Command Execution: An operator sends a critical command
to a remote system (e.g., an industrial controller, a financial transaction
processor).</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The system must provide fresh attestation Evidence to the
operator to prove its integrity before the command is dispatched. This
prevents commands from being executed on a compromised system.</t>
          </li>
        </ul>
      </section>
      <section anchor="confidential-data-collaboration">
        <name>Confidential Data Collaboration</name>
        <t>Goal: Enable multiple parties to collaborate on sensitive, combined datasets
without exposing raw data to each other or to the infrastructure operator.</t>
        <t>Use case: Data Clean Rooms: Multiple data providers contribute sensitive data to
a confidential workload for joint analysis. Data consumers receive aggregated
insights without ever accessing the raw, combined dataset.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: Before sending data, each data provider must attest the
confidential workload to verify it is running the authorized analysis code in
a secure Trusted Execution Environment (TEE). Similarly, data consumers must
attest the workload to trust the integrity of the results.</t>
          </li>
        </ul>
        <t>Use case: Secure Multi-Party Computation (MPC): Distributed parties
collaboratively compute a function (e.g., train a machine learning model)
without sharing their local data.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The central aggregator, as well as each participating client,
must be able to mutually attest to ensure all parties are running the correct,
untampered MPC algorithm in a trusted environment.</t>
          </li>
        </ul>
      </section>
      <section anchor="network-infrastructure-integrity">
        <name>Network Infrastructure Integrity</name>
        <t>Goal: Verify the integrity of network devices that form the foundation of
communication.</t>
        <t>Use case: Attestation of Network Functions: A router, switch, or firewall joins
a network's management plane. A Virtualized Network Function (VNF) is
instantiated on a generic server.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The network orchestrator must verify the device's integrity
(e.g., secure boot enabled, running signed OS and firmware) before allowing it
to join the network and receive policy. This prevents a compromised router
from misdirecting traffic or a malicious VNF from inspecting sensitive
packets.</t>
          </li>
        </ul>
        <t>Use case: Securing Control and Management Planes: An administrator connects to a
network device's management interface.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The administrator's client must verify the integrity of the
management endpoint on the network device to ensure they are not connecting to
a compromised interface that could steal credentials or manipulate the device.</t>
          </li>
        </ul>
      </section>
      <section anchor="operation-triggered-attestation-for-high-impact-application-operations">
        <name>Operation-Triggered Attestation for High-Impact Application Operations</name>
        <t>Goal: Ensure the integrity of application services at operation time,
when security posture may change after initial channel establishment.</t>
        <t>Use case: High-Assurance Operation Execution in Dynamic Application Services:
An application service instance (e.g., AI agent) or confidential computing
environment (which could host an AI agent) maintains a (D)TLS connection with
a peer and must execute a high-impact action (e.g., payment initiation,
configuration change, privileged command).</t>
        <ul spacing="normal">
          <li>
            <t>Requirement 1: Before executing a high-impact operation over the existing
connection, the peer must present fresh, connection-bound attestation evidence
reflecting the current behavior-affecting posture (e.g., enabled capabilities,
policy configuration, runtime permissions).</t>
          </li>
          <li>
            <t>Requirement 2: The mechanism should support lightweight, dynamic attestation
within the existing connection, without necessarily requiring a full new TLS
handshake, so that behavior-affecting posture changes are visible to relying
parties when required by local policy.</t>
          </li>
        </ul>
      </section>
      <section anchor="attestation-of-certificate-private-key">
        <name>Attestation of Certificate Private Key</name>
        <t>A TLS endpoint authenticates itself using an end-entity certificate whose
corresponding private key is claimed to be protected by a secure element.
While standard TLS authentication verifies possession of the private
key, it provides no assurance about where or how that key is stored and used.</t>
        <t>In this scenario, the peer acting as the Relying Party requires additional
assurance that the private key associated with the end-entity certificate used
to authenticate the TLS connection is generated, stored, and used within an
attested cryptographic module. In addition to verifying possession of the
private key via the TLS handshake, the Relying Party seeks
attestation evidence that the key is non-exportable, remains bound to the
cryptographic module, and that the module is operating in an expected
security configuration at the time the TLS connection is established.</t>
        <t>Remote attestation is used to provide Evidence about the cryptographic module
where the private key used for TLS authentication is stored. The Evidence may
include claims about the security properties of the cryptographic module.
To prevent replay attacks, this Evidence has to be fresh and tied to the
current TLS connection. Replayed Evidence could otherwise be used to falsely
assert key protection properties that no longer hold.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The Attester must be able to produce Evidence that demonstrates
that the private key used for secure channel authentication:
            </t>
            <ul spacing="normal">
              <li>
                <t>is generated and stored within a specific cryptographic module or secure
element,</t>
              </li>
              <li>
                <t>is protected against export or software extraction</t>
              </li>
              <li>
                <t>is attested using fresh Evidence that is bound to the current TLS connection.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>The Relying Party uses this Evidence, potentially with the assistance of a
Verifier, to determine whether the key protection properties satisfy its local
security policy.</t>
        <t>The approach described in <xref target="I-D.draft-ietf-rats-pkix-key-attestation"/> addresses this
use case partially by providing attestation of the cryptographic module and associated
private key at certificate issuance time, reflecting their state when the
certificate is enrolled. This model does not provide guarantees about the
continued state of the module at connection establishment or during the lifetime of
the TLS session.</t>
      </section>
      <section anchor="platform-to-platform-communication">
        <name>Platform-to-platform communication</name>
        <t>Goal: Allow platforms to establish a trustworthy secure channel with each other.</t>
        <t>Use case: Migration of workloads (confidential workloads in particular) between
different platforms. Migration is occasionally required in order to maintain
uptime for the hosted services across periods of scheduled downtime for the
hosting platform. Having remote attestation-enforced policies for such migration
events provides guarantees that the services will not be exposed to lower
security guarantees when migrating. Migration is typically performed by trusted,
low-level components (migration agents) on both source and destination
platforms, which perform the authorization checks and handle the data migration.</t>
        <ul spacing="normal">
          <li>
            <t>Requirement: The migration agent on the destination platform typically acts
as attester, proving its state for its peer on the source platform (where the
workload initially resides).</t>
          </li>
          <li>
            <t>Example: Intel TDX offers migration capabilities via its Migration TD (MigTD)
<xref target="MigTD"/>. Peer MigTDs on the initiating and target platforms set up an
attested TLS connection to perform the migration over.</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="integration-properties">
      <name>Integration Properties</name>
      <t>This section provides a list of desirable properties for designs that integrate
RA into secure channel protocols. Proposed integration protocols should make it
clear which of these properties are fulfilled, and how.</t>
      <section anchor="cryptographic-binding-to-communication-channel">
        <name>Cryptographic Binding to Communication Channel</name>
        <t>The attestation Evidence or Attestation Result is cryptographically bound to the
specific secure channel instance (e.g., the TLS connection). This prevents replay
and relay attacks where an attacker presents valid, but old or unrelated
Evidence from a different connection or context. This binding is paramount for all
use cases.</t>
      </section>
      <section anchor="cryptographic-binding-to-machine-identifier">
        <name>Cryptographic Binding to Machine Identifier</name>
        <t>Evidence should be cryptographically bound to the identifier provided to the machine by the infrastructure provider to prevent diversion attacks <xref target="Meeting-122-TLS-Slides"/>.</t>
      </section>
      <section anchor="attestation-credential-freshness">
        <name>Attestation Credential Freshness</name>
        <t>The Relying Party is able to verify that the Evidence or Attestation Result it
receives was freshly generated by the Attester for the current connection. State is
transient, and credentials from a previous connection may no longer be valid. See
<xref section="10" sectionFormat="of" target="RFC9334"/> for more details about freshness in the context of
RA.</t>
      </section>
      <section anchor="negotiation-and-capability-discovery">
        <name>Negotiation and Capability Discovery</name>
        <t>Peers have a secure mechanism to discover each other's support for RA, the
specific attestation formats they can produce or consume, and the attestation
models they support. This enables interoperability and allows for graceful
fallback for endpoints that do not support RA.</t>
      </section>
      <section anchor="attestation-model-flexibility">
        <name>Attestation Model Flexibility</name>
        <t>The solution supports both the Background Check and Passport models as defined
in the RATS architecture <xref target="RFC9334"/>. The Background Check model is essential
for use cases requiring maximum freshness, while the Passport model is better
suited for performance, scalability, and scenarios where the Verifier may be
offline or unreachable by the Relying Party.</t>
      </section>
      <section anchor="interaction-with-peer-authentication">
        <name>Interaction with Peer Authentication</name>
        <t>The solution supports using RA in conjunction with traditional PKI-based
authentication (e.g., X.509 certificates). This provides two independent pillars
of trust: trustworthiness (from RA) and identity (from PKI). The solution may
also support RA as the sole method of authentication in constrained use cases,
such as device onboarding, where a device has no stable, long-term identity yet.
This latter option could have a negative impact on the security of the overall
design, warranting additional security considerations.</t>
      </section>
      <section anchor="runtime-attestation">
        <name>Runtime Attestation</name>
        <t>Evidence collected at certificate issuance or during the initial secure channel establishment reflects only the Target Environment’s state at that moment. It cannot guarantee that the Target Environment remains trustworthy for the lifetime of the certificate or even for the duration of the TLS session. As a result, such static evidence is insufficient in environments where the Target Environment may change state after the connection is established and the connection is long-lived.</t>
        <t>Runtime attestation closes this gap by enabling the Relying Party (RP) to request new attestation evidence once the TLS connection has been established, or periodically during long-lived connections if necessary.
This may be the case when the target environment has attributes that can change during the connection, affecting its trustworthiness. Such changes cannot be detected using evidence collected earlier.
For example, the evidence may include dynamic parameters such as runtime configuration flags (e.g., FIPS mode), where a device may enter or exit an approved mode, or measurements of critical system files.</t>
      </section>
      <section anchor="privacy-preservation">
        <name>Privacy Preservation</name>
        <t>The solution must not degrade the privacy of a standard TLS connection. Evidence
can contain highly specific, unique information about a device's hardware and
software, which could be used as an advanced tracking mechanism, following a
user across different connections and services. The design must consider how to
minimize this leakage, especially when a third-party Verifier is involved in the
protocol exchange.</t>
      </section>
      <section anchor="performance-and-efficiency">
        <name>Performance and Efficiency</name>
        <t>The introduction of attestation should not add prohibitive latency or overhead
to the connection establishment process. To be widely adopted, the solution must
be practical. While some overhead is unavoidable, multiple additional
round-trips or very large payloads in the initial handshake should be minimized.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This document describes use cases and integration properties. The security of
any protocol designed to fulfill these properties will depend on its specific
mechanisms. However, any solution must address the following high-level
considerations:</t>
      <ul spacing="normal">
        <li>
          <t>Replay and Relay Protection: The requirements for cryptographic binding and
freshness are critical. Failure to bind attestation credentials tightly to the
current connection would allow an adversary to replay or relay old or stolen, yet
valid credentials from a compromised system, completely undermining the
security goals.</t>
        </li>
        <li>
          <t>Verifier Trust and Privacy: In the Background Check model, the Relying Party
communicates with a Verifier. This reveals to the Verifier that the Relying
Party is communicating with the Attester. Depending on the scenario, this
could leak sensitive information about business relationships or user
activity. Solutions should consider mechanisms to minimize the data revealed
to the Verifier.</t>
        </li>
        <li>
          <t>Downgrade Attacks: The negotiation of attestation capabilities must be secure.
An active attacker must not be able to trick two parties that both support
attestation into negotiating a connection without it.</t>
        </li>
        <li>
          <t>Evidence Semantics: This document does not define attestation appraisal
policies. However, a Relying Party must be careful when interpreting
Attestation Results. A "valid" attestation only means the Evidence is
authentic and correctly signed; it does not automatically mean the underlying
system is "secure". The Relying Party must have a clear policy for what
measurements, software versions, and security configurations are acceptable.</t>
        </li>
      </ul>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="I-D.draft-ietf-rats-pkix-key-attestation">
          <front>
            <title>PKIX Evidence for Remote Attestation of Hardware Security Modules</title>
            <author fullname="Mike Ounsworth" initials="M." surname="Ounsworth">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Jean-Pierre Fiset" initials="J." surname="Fiset">
              <organization>Crypto4A Inc.</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <author fullname="Monty Wiseman" initials="M." surname="Wiseman">
         </author>
            <author fullname="Ned Smith" initials="N." surname="Smith">
              <organization>Intel Corporation</organization>
            </author>
            <date day="10" month="October" year="2025"/>
            <abstract>
              <t>   This document specifies a vendor-agnostic format for evidence
   produced and verified within a PKIX context.  The evidence produced
   this way includes claims collected about a cryptographic module and
   elements found within it such as cryptographic keys.

   One scenario envisaged is that the state information about the
   cryptographic module can be securely presented to a remote operator
   or auditor in a vendor-agnostic verifiable format.  A more complex
   scenario would be to submit this evidence to a Certification
   Authority to aid in determining whether the storage properties of
   this key meet the requirements of a given certificate profile.

   This specification also offers a format for requesting a
   cryptographic module to produce evidence tailored for expected use.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-pkix-key-attestation-02"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC9334">
          <front>
            <title>Remote ATtestation procedureS (RATS) Architecture</title>
            <author fullname="H. Birkholz" initials="H." surname="Birkholz"/>
            <author fullname="D. Thaler" initials="D." surname="Thaler"/>
            <author fullname="M. Richardson" initials="M." surname="Richardson"/>
            <author fullname="N. Smith" initials="N." surname="Smith"/>
            <author fullname="W. Pan" initials="W." surname="Pan"/>
            <date month="January" year="2023"/>
            <abstract>
              <t>In network protocol exchanges, it is often useful for one end of a communication to know whether the other end is in an intended operating state. This document provides an architectural overview of the entities involved that make such tests possible through the process of generating, conveying, and evaluating evidentiary Claims. It provides a model that is neutral toward processor architectures, the content of Claims, and protocols.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9334"/>
          <seriesInfo name="DOI" value="10.17487/RFC9334"/>
        </reference>
        <reference anchor="I-D.draft-ccc-wimse-twi-extensions">
          <front>
            <title>WIMSE Extensions for Trustworthy Workload Identity</title>
            <author fullname="Mark Novak" initials="M." surname="Novak">
              <organization>J.P. Morgan Chase</organization>
            </author>
            <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
              <organization>arm</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="5" month="January" year="2026"/>
            <abstract>
              <t>   This document contains a gap analysis that is the output of the
   Confidential Computing Consortium identifying areas in the IETF WIMSE
   WG work where the current WIMSE architecture should be extended to
   accommodate workloads running in Confidential Computing environments.
   This document contains a high-level outline for these extensions.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ccc-wimse-twi-extensions-01"/>
        </reference>
        <reference anchor="I-D.draft-ietf-rats-eat-measured-component">
          <front>
            <title>EAT Measured Component</title>
            <author fullname="Simon Frost" initials="S." surname="Frost">
              <organization>Arm</organization>
            </author>
            <author fullname="Thomas Fossati" initials="T." surname="Fossati">
              <organization>Linaro</organization>
            </author>
            <author fullname="Hannes Tschofenig" initials="H." surname="Tschofenig">
              <organization>University of Applied Sciences Bonn-Rhein-Sieg</organization>
            </author>
            <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
              <organization>Fraunhofer SIT</organization>
            </author>
            <date day="12" month="January" year="2026"/>
            <abstract>
              <t>   The term "measured component" refers to an object within the
   attester's target environment whose state can be sampled and
   typically digested using a cryptographic hash function.  Examples of
   measured components include firmware stored in flash memory, software
   loaded into memory at start time, data stored in a file system, or
   values in a CPU register.  This document provides the information
   model for the "measured component" and two associated data models.
   This separation is intentional: the JSON and CBOR serializations,
   coupled with the media types and associated Constrained Application
   Protocol (CoAP) Content-Formats, enable the immediate use of the
   semantics within the Entity Attestation Token (EAT) framework.
   Meanwhile, the information model can be reused in future
   specifications to provide additional serializations, for example
   using ASN.1.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-rats-eat-measured-component-10"/>
        </reference>
        <reference anchor="Meeting-122-TLS-Slides" target="https://datatracker.ietf.org/meeting/122/materials/slides-122-tls-identity-crisis-00">
          <front>
            <title>Identity Crisis in Attested TLS for Confidential Computing</title>
            <author initials="M. U." surname="Sardar">
              <organization/>
            </author>
            <author initials="M." surname="Moustafa">
              <organization/>
            </author>
            <author initials="T." surname="Aura">
              <organization/>
            </author>
            <date year="2025" month="March"/>
          </front>
        </reference>
        <reference anchor="AI-agents" target="https://arxiv.org/abs/2407.01502">
          <front>
            <title>AI agents that matter</title>
            <author initials="S." surname="Kapoor">
              <organization/>
            </author>
            <author initials="B." surname="Stroebl">
              <organization/>
            </author>
            <author initials="Z. S." surname="Siegel">
              <organization/>
            </author>
            <author initials="N." surname="Nadgir">
              <organization/>
            </author>
            <author initials="A." surname="Narayanan">
              <organization/>
            </author>
            <date year="2024" month="July"/>
          </front>
        </reference>
        <reference anchor="MigTD" target="https://github.com/intel/MigTD">
          <front>
            <title>Intel TDX Migration TD</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 425?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
