Open PenglinYang opened 2 years ago
The scope of this document should not only include edge computing scenario. The scope could be any confidential computing environment which need to be configured by network.
The scope of this document should not only include edge computing scenario. The scope could be any confidential computing environment which need to be configured by network.