14.2. Informative References
[CCC-DeepDive] Confidential Computing Consortium, "A Technical Analysis of Confidential Computing", Version 1.3, November 2022, https://confidentialcomputing.io/white-papers-reports.
[CTAP] FIDO Alliance, "Client to Authenticator Protocol (CTAP)", February 2018, https://fidoalliance.org/specs/fido-v2.0-id-20180227/fido-client-to-authenticator-protocol-v2.0-id-20180227.html.
[NIST-800-57-p1] Barker, E., "Recommendation for Key Management: Part 1 - General", DOI 10.6028/NIST.SP.800-57pt1r5, May 2020, https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf.
[OPCUA] OPC Foundation, "OPC Unified Architecture Specification, Part 2: Security Model, Release 1.03", OPC 10000-2, November 2015, https://opcfoundation.org/developer-tools/specifications-unified-architecture/part-2-security-model/.
[RATS-DAA] Birkholz, H., Newton, C., Chen, L., and D. Thaler, "Direct Anonymous Attestation for the Remote Attestation Procedures Architecture", Work in Progress, Internet-Draft, draft-ietf-rats-daa-02, 7 September 2022, https://datatracker.ietf.org/doc/html/draft-ietf-rats-daa-02.
[RATS-PSA-TOKEN] Tschofenig, H., Frost, S., Brossard, M., Shaw, A., and T. Fossati, "Arm's Platform Security Architecture (PSA) Attestation Token", Work in Progress, Internet-Draft, draft-tschofenig-rats-psa-token-10, 6 September 2022, https://datatracker.ietf.org/doc/html/draft-tschofenig-rats-psa-token-10.
[RATS-TUDA] Fuchs, A., Birkholz, H., McDonald, I., and C. Bormann, "Time-Based Uni-Directional Attestation", Work in Progress, Internet-Draft, draft-birkholz-rats-tuda-07, 10 July 2022, https://datatracker.ietf.org/doc/html/draft-birkholz-rats-tuda-07.
[RATS-UCCS] Birkholz, H., O'Donoghue, J., Cam-Winget, N., and C. Bormann, "A CBOR Tag for Unprotected CWT Claims Sets", Work in Progress, Internet-Draft, draft-ietf-rats-uccs-04, 11 January 2023, https://datatracker.ietf.org/doc/html/draft-ietf-rats-uccs-04.
[RFC4086] Eastlake 3rd, D., Schiller, J., and S. Crocker, "Randomness Requirements for Security", BCP 106, RFC 4086, DOI 10.17487/RFC4086, June 2005, https://www.rfc-editor.org/info/rfc4086.
[RFC4949] Shirey, R., "Internet Security Glossary, Version 2", FYI 36, RFC 4949, DOI 10.17487/RFC4949, August 2007, https://www.rfc-editor.org/info/rfc4949.
[RFC5209] Sangster, P., Khosravi, H., Mani, M., Narayan, K., and J. Tardo, "Network Endpoint Assessment (NEA): Overview and Requirements", RFC 5209, DOI 10.17487/RFC5209, June 2008, https://www.rfc-editor.org/info/rfc5209.
[RFC6024] Reddy, R. and C. Wallace, "Trust Anchor Management Requirements", RFC 6024, DOI 10.17487/RFC6024, October 2010, https://www.rfc-editor.org/info/rfc6024.
[RFC8322] Field, J., Banghart, S., and D. Waltermire, "Resource-Oriented Lightweight Information Exchange (ROLIE)", RFC 8322, DOI 10.17487/RFC8322, February 2018, https://www.rfc-editor.org/info/rfc8322.
[strengthoffunction] NIST, "Strength of Function", https://csrc.nist.gov/glossary/term/strength_of_function.
[TCG-DICE] Trusted Computing Group, "DICE Attestation Architecture", Version 1.00, Revision 0.23, March 2021, https://trustedcomputinggroup.org/wp-content/uploads/DICE-Attestation-Architecture-r23-final.pdf.
[TCG-DICE-SIBDA] Trusted Computing Group, "Symmetric Identity Based Device Attestation", Version 1.0, Revision 0.95, January 2020, https://trustedcomputinggroup.org/wp-content/uploads/TCG_DICE_SymIDAttest_v1_r0p95_pub-1.pdf.
[TCGarch] Trusted Computing Group, "Trusted Platform Module Library, Part 1: Architecture", November 2019, https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf.
[TEEP-ARCH] Pei, M., Tschofenig, H., Thaler, D., and D. Wheeler, "Trusted Execution Environment Provisioning (TEEP) Architecture", Work in Progress, Internet-Draft, draft-ietf-teep-architecture-19, 24 October 2022, https://datatracker.ietf.org/doc/html/draft-ietf-teep-architecture-19.
[TLS-CWT] Tschofenig, H. and M. Brossard, "Using CBOR Web Tokens (CWTs) in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)", Work in Progress, Internet-Draft, draft-tschofenig-tls-cwt-02, 13 July 2020, https://datatracker.ietf.org/doc/html/draft-tschofenig-tls-cwt-02.
[WebAuthN] W3C, "Web Authentication: An API for accessing Public Key Credentials Level 1", March 2019, https://www.w3.org/TR/webauthn-1/.