Threat Analysis of the Geopriv Protocol

نویسندگان

  • Michelle Engelhardt Danley
  • Deirdre K. Mulligan
  • John B. Morris
  • Jon Peterson
چکیده

This document provides some analysis of threats against the Geopriv protocol architecture. It focuses on protocol threats, threats that result from the storage of data by entities in the architecture, and threats posed by the abuse of information yielded by Geopriv. Some security properties that meet these threats are enumerated as a reference for Geopriv requirements. Danley, et al. Informational [Page 1] RFC 3694 Threat Analysis of the Geopriv Protocol February 2004 Table of

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rfc 4079 Geopriv

A Presence Architecture for the Distribution of GEOPRIV Location Objects Status of This Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract GEOPRIV defines the concept of a 'using protocol'-a protocol that carries GEOPRIV location objects. GEOPRIV also defines various scenarios for...

متن کامل

The IETF Geopriv and Presence Architecture Focusing on Location Privacy

The Geographic Location/Privacy (geopriv) working group defines the concept of a ’using protocol’, a protocol that carries Geopriv location objects. Geopriv also defines various scenarios for the distribution of location objects that require the concept of subscriptions and asynchronous notifications. This document shows the big picture with the alignment of the Geopriv and the presence archite...

متن کامل

A Presence Architecture for the Distribution of GEOPRIV Location Objects

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as refer...

متن کامل

Internet Engineering Task Force (ietf) Geopriv Layer 7 Location Configuration Protocol: Problem Statement and Requirements

This document provides a problem statement, lists requirements, and captures design aspects for a GEOPRIV Layer 7 (L7) Location Configuration Protocol (LCP). This protocol aims to allow an end host to obtain location information, by value or by reference, from a Location Information Server (LIS) that is located in the access network. The obtained location information can then be used for a vari...

متن کامل

GEOPRIV Layer 7 Location Configuration Protocol: Problem Statement and Requirements

This document provides a problem statement, lists requirements, and captures design aspects for a GEOPRIV Layer 7 (L7) Location Configuration Protocol (LCP). This protocol aims to allow an end host to obtain location information, by value or by reference, from a Location Information Server (LIS) that is located in the access network. The obtained location information can then be used for a vari...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • RFC

دوره 3694  شماره 

صفحات  -

تاریخ انتشار 2004