Veille Technologique Sécurité - cert devoteam
Veille Technologique Sécurité - cert devoteam
Veille Technologique Sécurité - cert devoteam
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Avril 2001<br />
DNS draft-ietf-dnsext-rsa-03 12/04 RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System<br />
draft-lewis-state-of-dnssec-01 23/03 Notes from the State-Of-The-Technology: DNSSEC<br />
EDI draft-ietf-ediint-as1-12 09/04 MIME-based Secure EDI<br />
draft-ietf-ediint-as2-08 05/04 HTTP Transport for Secure EDI<br />
IDS draft-ietf-idwg-iap-05 11/04 IAP: Intrusion Alert Protocol<br />
IETF draft-rescorla-sec-cons-03 30/03 Guidelines for Writing RFC Text on Security Considerations<br />
IKE draft-beaulieu-ike-xauth-01 02/04 Extended Authentication within IKE (XAUTH)<br />
draft-dukes-ike-mode-cfg-01 02/04 The ISAKMP Configuration Method<br />
IPSEC draft-ietf-ipsec-ike-auth-ecdsa-02 30/03 IKE Authentication Using ECDSA<br />
draft-ietf-ipsec-ike-ecc-groups-03 30/03 Additional ECC Groups For IKE<br />
draft-ietf-ipsec-openpgp-01 23/03 OpenPGP Key Usage in IKE<br />
MOBILEIP draft-haverinen-mobileip-gsmsim-02 11/04 GSM SIM Authentication and Key Generation for Mobile IP<br />
draft-skibbie-krb-kdc-ldap-schema-01 30/03 Kerberos KDC LDAP Schema<br />
PGP draft-ietf-openpgp-mime-06 10/04 MIME Security with OpenPGP<br />
PKIX draft-ietf-pkix-new-part1-06 09/04 Internet X.509 PKI Certificate and CRL Profile<br />
draft-ietf-pkix-pi-02 02/04 Internet X.509 Public Key Infrastructure Permanent Identifier<br />
draft-ietf-pkix-time-stamp-14 06/04 Internet X.509 PKI Time Stamp Protocols (TSP)<br />
draft-orman-public-key-lengths-02 22/03 Determining strengths for PK used for exchanging symmetric keys<br />
PPP draft-haverinen-pppext-eap-sim-01 11/04 EAP SIM Authentication (Version 1)<br />
SACRED draft-ietf-sacred-reqs-02 30/03 Securely Available Credentials - Requirements<br />
SHA draft-eastlake-sha1-01 11/04 US Secure Hash Algorithm 1 (SHA1)<br />
SIP draft-gross-sipaq-01 13/04 QoS and AAA Usage with SIP Based IP Communications<br />
SMIME draft-ietf-smime-aes-alg-01 23/03 Use of the Advanced Encryption Algorithm in CMS<br />
draft-ietf-smime-esformats-04 09/04 Electronic Signature Formats for long term electronic signatures<br />
draft-ietf-smime-espolicies-01 09/04 Electronic Signature Policies<br />
SSH draft-nisse-secsh-srp-01 30/03 Using the SRP protocol as a key exchange method in Secure Shell<br />
SSL draft-murray-auth-ftp-ssl-07 09/04 Securing FTP with TLS<br />
TLS draft-ietf-tls-ecc-01 30/03 ECC Cipher Suites For TLS<br />
draft-ietf-tls-openpgp-01 23/03 Extensions to TLS for OpenPGP keys<br />
TRACK draft-ietf-rmt-pi-track-security-01 06/04 Security Requirements For TRACK<br />
DRAFTS TRAITANT DE DOMAINES CONNEXES A LA SECURITE<br />
Thème Nom du Draft Date Titre<br />
BEEP draft-mrose-beep-design-03 30/03 On the Design of Application Protocols<br />
BGP draft-berkowitz-bgpcon-01 09/04 Benchmarking Methodology for Exterior Routing Convergence<br />
DIAMETER draft-ietf-aaa-diameter-02 09/04 Diameter Base Protocol<br />
draft-ietf-aaa-diameter-api-00 11/04 The DIAMETER API<br />
draft-ietf-aaa-diameter-mobileip-02 09/04 Diameter Mobile IP Extensions<br />
draft-ietf-aaa-diameter-nasreq-02 09/04 Diameter NASREQ Extensions<br />
DNS draft-ietf-dnsop-hardie-shared-root-server-04 22/03 Distributing Root / Authoritative NS via shared unicast addresses<br />
draft-slone-dn2fqdn-00 11/04 Converting LDAP/X.500 DN to DNS to support server location<br />
ECML draft-ietf-trade-ecml2-req-01 02/04 Electronic Commerce Modeling Language: Version 2 Requirements<br />
IPS draft-ietf-ips-iscsi-reqmts-03 20/04 iSCSI Requirements and Design Considerations<br />
LDAP draft-greenblatt-ldapext-style-01 02/04 LDAP Extension Style Guide<br />
draft-greenblatt-ldap-perms-00 03/04 Application Defined Permissions for LDAP<br />
draft-ietf-ldapbis-iana-01 12/04 IANA Considerations for LDAP<br />
draft-ietf-ldapbis-user-schema-00 06/04 A Summary of the X.500 User Schema for use with LDAPv3<br />
draft-rharrison-ldap-framing-profile-00 22/03 Profile for Framing LDAPv3 Operations<br />
draft-rharrison-ldap-intermediate-resp-00 02/04 LDAP Intermediate Response<br />
draft-weltman-ldap-java-controls-06 29/03 Java LDAP Controls<br />
draft-zeilenga-ldap-cancel-03 02/04 LDAP Cancel Extended Operation<br />
draft-zeilenga-ldap-dnsref-00 02/04 Use of DNS SRV in LDAP Named Subordinate References<br />
draft-zeilenga-ldap-features-00 04/04 Feature Discovery in LDAP<br />
draft-zeilenga-ldap-grouping-02 02/04 LDAPv3: Grouping of Related Operations<br />
draft-zeilenga-ldap-idn-01 03/04 International Domain Names and LDAP<br />
draft-zeilenga-ldap-opattrs-00 04/04 LDAPv3: All Operational Attributes<br />
draft-zeilenga-ldap-txn-02 03/04 LDAPv3 Transactions<br />
draft-zeilenga-ldapv3bis-opattrs-06 02/04 LDAPv3: All Operational Attributes<br />
LDUP draft-ietf-ldup-replica-req-08 29/03 LDAPv3 Replication Requirements<br />
draft-ietf-ldup-subentry-08 06/04 LDAP Subentry Schema<br />
MPLS draft-shah-mpls-l2vpn-ext-00 22/03 Extensions to MPLS-based Layer 2 VPNs<br />
NAT draft-ietf-nat-app-guide-05 22/03 NAT Friendly Application Design Guidelines<br />
draft-ietf-nat-interface-framework-03 10/04 Framework for interfacing with Network Address Translator<br />
NGTRANS draft-ietf-ngtrans-isatap-00 23/03 Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)<br />
PILC draft-ietf-pilc-pep-06 05/04 Perf. Enhancing Proxies That Improve Link-Related Degradations<br />
POLICY draft-ietf-policy-core-schema-10 02/04 Policy Framework LDAP Core Schema<br />
draft-ietf-policy-pcim-ext-01 09/04 Policy Core Information Model Extensions<br />
PPP draft-shimizu-ppp-mapos-01 02/04 MAPOS/PPP Tunneling mode<br />
SPPI draft-ietf-rap-sppi-06 13/04 Structure of Policy Provisioning Information (SPPI)<br />
SYSLOG draft-ietf-syslog-reliable-05 30/03 Reliable Delivery for Syslog<br />
draft-ietf-syslog-syslog-07 30/03 Syslog Protocol<br />
AUTRES DRAFTS<br />
<strong>Veille</strong> <strong>Technologique</strong> <strong>Sécurité</strong> N°33 Page 16/59<br />
© APOGEE Communications - Tous droits réservés Diffusion restreinte aux clients abonnés aux services VTS-RAPPORT et VTS-ENTREPRISE