Table of Contents - Y.3165 (08/2025) - Requirements of orchestration supporting confidential computing for network slices in IMT-2020 networks and beyond

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Requirements of orchestration supporting confidential computing for network slices
7.1 General requirements
7.2 Requirements for confidential computing resource discovery
7.3 Requirements for confidential computing resource description
7.4 Requirements for confidential computing resource orchestration
7.5 Requirements for remote attestation of the confidential computing resource
7.6 Requirements for interconnection of heterogeneous TEEs
8 Architecture of orchestration supporting confidential computing for network slices
8.1 Functional requirements of network slice orchestration supporting confidential computing
8.2 Interface description
9 Procedures of orchestration supporting confidential computing for network slices
9.1 Procedure of hardware-based TEE capability registration
9.2 Procedure of TEE instances registration
9.3 Procedure of instantiation of network slice with confidential computing resource
9.4 Procedure of modification of network slice with confidential computing resource
9.5 Procedure of remote attestation of TEE instances
10 Security considerations
Appendix I – Use cases of orchestration supporting confidential computing
I.1 Confidential computing resource orchestration for the data analysis function in IMT-2020 network slice of the core network
I.2 Hybrid computing resource orchestration including confidential computing for the vertical industry slices
I.3 Trusted path of the slice user plane based on orchestration including the confidential computing
Bibliography