I2RS Security Considerations
draft-hares-i2rs-security-03
Document | Type | Expired Internet-Draft (individual) | |
---|---|---|---|
Authors | Susan Hares , Scott Brim , Nancy Cam-Winget , Dacheng Zhang , Qin Wu , Ahmed Abro , Salman Asadullah , Joel Halpern , Eric Yu | ||
Last updated | 2015-08-10 (latest revision 2015-02-06) | ||
Stream | (None) | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | Stream state | (No stream defined) | |
Consensus Boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-hares-i2rs-security-03.txt
Abstract
This presents an expansion of the security architecture found in the i2rs architecture.
Authors
Susan Hares
(shares@ndzh.com)
Scott Brim
(scott.brim@gmail.com)
Nancy Cam-Winget
(ncamwing@cisco.com)
Dacheng Zhang
(zhangdacheng@huawei.com)
Qin Wu
(bill.wu@huawei.com)
Ahmed Abro
(aabro@cisco.com)
Salman Asadullah
(sasad@cisco.com)
Joel Halpern
(joel.halpern@ericsson.com)
Eric Yu
(eyu@cisco.com)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)