17.06.2013 Views

Veille Technologique Sécurité - cert devoteam

Veille Technologique Sécurité - cert devoteam

Veille Technologique Sécurité - cert devoteam

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Avril 2001<br />

DNS draft-ietf-dnsext-rsa-03 12/04 RSA/SHA-1 SIGs and RSA KEYs in the Domain Name System<br />

draft-lewis-state-of-dnssec-01 23/03 Notes from the State-Of-The-Technology: DNSSEC<br />

EDI draft-ietf-ediint-as1-12 09/04 MIME-based Secure EDI<br />

draft-ietf-ediint-as2-08 05/04 HTTP Transport for Secure EDI<br />

IDS draft-ietf-idwg-iap-05 11/04 IAP: Intrusion Alert Protocol<br />

IETF draft-rescorla-sec-cons-03 30/03 Guidelines for Writing RFC Text on Security Considerations<br />

IKE draft-beaulieu-ike-xauth-01 02/04 Extended Authentication within IKE (XAUTH)<br />

draft-dukes-ike-mode-cfg-01 02/04 The ISAKMP Configuration Method<br />

IPSEC draft-ietf-ipsec-ike-auth-ecdsa-02 30/03 IKE Authentication Using ECDSA<br />

draft-ietf-ipsec-ike-ecc-groups-03 30/03 Additional ECC Groups For IKE<br />

draft-ietf-ipsec-openpgp-01 23/03 OpenPGP Key Usage in IKE<br />

MOBILEIP draft-haverinen-mobileip-gsmsim-02 11/04 GSM SIM Authentication and Key Generation for Mobile IP<br />

draft-skibbie-krb-kdc-ldap-schema-01 30/03 Kerberos KDC LDAP Schema<br />

PGP draft-ietf-openpgp-mime-06 10/04 MIME Security with OpenPGP<br />

PKIX draft-ietf-pkix-new-part1-06 09/04 Internet X.509 PKI Certificate and CRL Profile<br />

draft-ietf-pkix-pi-02 02/04 Internet X.509 Public Key Infrastructure Permanent Identifier<br />

draft-ietf-pkix-time-stamp-14 06/04 Internet X.509 PKI Time Stamp Protocols (TSP)<br />

draft-orman-public-key-lengths-02 22/03 Determining strengths for PK used for exchanging symmetric keys<br />

PPP draft-haverinen-pppext-eap-sim-01 11/04 EAP SIM Authentication (Version 1)<br />

SACRED draft-ietf-sacred-reqs-02 30/03 Securely Available Credentials - Requirements<br />

SHA draft-eastlake-sha1-01 11/04 US Secure Hash Algorithm 1 (SHA1)<br />

SIP draft-gross-sipaq-01 13/04 QoS and AAA Usage with SIP Based IP Communications<br />

SMIME draft-ietf-smime-aes-alg-01 23/03 Use of the Advanced Encryption Algorithm in CMS<br />

draft-ietf-smime-esformats-04 09/04 Electronic Signature Formats for long term electronic signatures<br />

draft-ietf-smime-espolicies-01 09/04 Electronic Signature Policies<br />

SSH draft-nisse-secsh-srp-01 30/03 Using the SRP protocol as a key exchange method in Secure Shell<br />

SSL draft-murray-auth-ftp-ssl-07 09/04 Securing FTP with TLS<br />

TLS draft-ietf-tls-ecc-01 30/03 ECC Cipher Suites For TLS<br />

draft-ietf-tls-openpgp-01 23/03 Extensions to TLS for OpenPGP keys<br />

TRACK draft-ietf-rmt-pi-track-security-01 06/04 Security Requirements For TRACK<br />

DRAFTS TRAITANT DE DOMAINES CONNEXES A LA SECURITE<br />

Thème Nom du Draft Date Titre<br />

BEEP draft-mrose-beep-design-03 30/03 On the Design of Application Protocols<br />

BGP draft-berkowitz-bgpcon-01 09/04 Benchmarking Methodology for Exterior Routing Convergence<br />

DIAMETER draft-ietf-aaa-diameter-02 09/04 Diameter Base Protocol<br />

draft-ietf-aaa-diameter-api-00 11/04 The DIAMETER API<br />

draft-ietf-aaa-diameter-mobileip-02 09/04 Diameter Mobile IP Extensions<br />

draft-ietf-aaa-diameter-nasreq-02 09/04 Diameter NASREQ Extensions<br />

DNS draft-ietf-dnsop-hardie-shared-root-server-04 22/03 Distributing Root / Authoritative NS via shared unicast addresses<br />

draft-slone-dn2fqdn-00 11/04 Converting LDAP/X.500 DN to DNS to support server location<br />

ECML draft-ietf-trade-ecml2-req-01 02/04 Electronic Commerce Modeling Language: Version 2 Requirements<br />

IPS draft-ietf-ips-iscsi-reqmts-03 20/04 iSCSI Requirements and Design Considerations<br />

LDAP draft-greenblatt-ldapext-style-01 02/04 LDAP Extension Style Guide<br />

draft-greenblatt-ldap-perms-00 03/04 Application Defined Permissions for LDAP<br />

draft-ietf-ldapbis-iana-01 12/04 IANA Considerations for LDAP<br />

draft-ietf-ldapbis-user-schema-00 06/04 A Summary of the X.500 User Schema for use with LDAPv3<br />

draft-rharrison-ldap-framing-profile-00 22/03 Profile for Framing LDAPv3 Operations<br />

draft-rharrison-ldap-intermediate-resp-00 02/04 LDAP Intermediate Response<br />

draft-weltman-ldap-java-controls-06 29/03 Java LDAP Controls<br />

draft-zeilenga-ldap-cancel-03 02/04 LDAP Cancel Extended Operation<br />

draft-zeilenga-ldap-dnsref-00 02/04 Use of DNS SRV in LDAP Named Subordinate References<br />

draft-zeilenga-ldap-features-00 04/04 Feature Discovery in LDAP<br />

draft-zeilenga-ldap-grouping-02 02/04 LDAPv3: Grouping of Related Operations<br />

draft-zeilenga-ldap-idn-01 03/04 International Domain Names and LDAP<br />

draft-zeilenga-ldap-opattrs-00 04/04 LDAPv3: All Operational Attributes<br />

draft-zeilenga-ldap-txn-02 03/04 LDAPv3 Transactions<br />

draft-zeilenga-ldapv3bis-opattrs-06 02/04 LDAPv3: All Operational Attributes<br />

LDUP draft-ietf-ldup-replica-req-08 29/03 LDAPv3 Replication Requirements<br />

draft-ietf-ldup-subentry-08 06/04 LDAP Subentry Schema<br />

MPLS draft-shah-mpls-l2vpn-ext-00 22/03 Extensions to MPLS-based Layer 2 VPNs<br />

NAT draft-ietf-nat-app-guide-05 22/03 NAT Friendly Application Design Guidelines<br />

draft-ietf-nat-interface-framework-03 10/04 Framework for interfacing with Network Address Translator<br />

NGTRANS draft-ietf-ngtrans-isatap-00 23/03 Intra-Site Automatic Tunnel Addressing Protocol (ISATAP)<br />

PILC draft-ietf-pilc-pep-06 05/04 Perf. Enhancing Proxies That Improve Link-Related Degradations<br />

POLICY draft-ietf-policy-core-schema-10 02/04 Policy Framework LDAP Core Schema<br />

draft-ietf-policy-pcim-ext-01 09/04 Policy Core Information Model Extensions<br />

PPP draft-shimizu-ppp-mapos-01 02/04 MAPOS/PPP Tunneling mode<br />

SPPI draft-ietf-rap-sppi-06 13/04 Structure of Policy Provisioning Information (SPPI)<br />

SYSLOG draft-ietf-syslog-reliable-05 30/03 Reliable Delivery for Syslog<br />

draft-ietf-syslog-syslog-07 30/03 Syslog Protocol<br />

AUTRES DRAFTS<br />

<strong>Veille</strong> <strong>Technologique</strong> <strong>Sécurité</strong> N°33 Page 16/59<br />

© APOGEE Communications - Tous droits réservés Diffusion restreinte aux clients abonnés aux services VTS-RAPPORT et VTS-ENTREPRISE

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!