Closed PenglinYang closed 1 year ago
The scope of this document should not only include edge computing scenario. The scope could be any confidential computing environment which need to be configured by network.
duplicated to issue 13
The scope of this document should not only include edge computing scenario. The scope could be any confidential computing environment which need to be configured by network.