IP Security Document Roadmap
نویسندگان
چکیده
The IPsec protocol suite is used to provide privacy and authentication services at the IP layer. Several documents are used to describe this protocol suite. The interrelationship and organization of the various documents covering the IPsec protocol are discussed here. An explanation of what to find in which document, and what to include in new Encryption Algorithm and Authentication Algorithm documents are described. Table of
منابع مشابه
Internet Draft Security Architecture for IP 4
This memo describes the security mechanisms for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. Each security mechanism is specified in a separate document. This document also describes key management requirements for systems implementing those security mechanisms. This document is not an overall Security Architecture for the Internet and is instead focused on IP...
متن کاملInternet Draft Security Architecture for IP 10 November 1996
This memo describes the security protocols for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. Each security protocol is specified in a separate document. This document also describes key management requirements for systems implementing these security protocols. This document is not an overall Security Architecture for the Internet; it addresses only IP-layer sec...
متن کاملInternet Draft Security Architecture for IP 4 June 1996
This memo describes the security mechanisms for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. Each security mechanism is specified in a separate document. This document also describes key management requirements for systems implementing those security mechanisms. This document is not an overall Security Architecture for the Internet and is instead focused on IP...
متن کاملSecurity Architecture for the Internet Protocol
This memo describes the security protocols for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. Each security protocol is specified in a separate document. This document also describes key management requirements for systems implementing these security protocols. This document is not an overall Security Architecture for the Internet; it addresses only IP-layer sec...
متن کاملD2 Qos Roadmap 1.0 Ist-2000-26418 Ngni next Generation Networsk Initiative Contractual Delivery Date: Actual Delivery Date: Deliverable Type* -security**: Editor: Maurizio Molina (nec)
In the recent past research and development efforts in the area of technologies for QoS support mainly concentrated on the definition of architectures and protocols for differentiated packet treatment at the IP level. However, their wide deployment is still lacking as a result of lack of general and simple rules for their configuration. But even if they were, would this really bring to ubiquito...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- RFC
دوره 2411 شماره
صفحات -
تاریخ انتشار 1998