"Definition of the ROLIE Software Descriptor Extension" - Stephen Banghart,...
2019-06-28, rev -07: This document uses the "information-type" extension point as defined in the Resource-Oriented Lightweight Information Exchange (ROLIE) [RFC8322] Section 7.1.2 to better support...
View Article"Definition of the ROLIE Software Descriptor Extension" - Stephen Banghart,...
2019-07-22, rev -08: This document uses the "information-type" extension point as defined in the Resource-Oriented Lightweight Information Exchange (ROLIE) [RFC8322] Section 7.1.2 to better support...
View Article"Concise Software Identification Tags" - Henk Birkholz, Jessica...
2019-07-25, rev -12: ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and...
View Article"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...
2019-07-26, rev -02: This memo defines a Security Automation and Continuous Monitoring (SACM) architecture. This work is built upon [RFC8600], and is predicated upon information gleaned from SACM Use...
View Article"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...
2019-09-06, rev -03: This memo defines a Security Automation and Continuous Monitoring (SACM) architecture. This work is built upon [RFC8600], and is predicated upon information gleaned from SACM Use...
View Article"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...
2019-10-29, rev -04: This document defines an architecture enabling a cooperative Security Automation and Continuous Monitoring (SACM) ecosystem. This work is predicated upon information gleaned from...
View Article"Endpoint Posture Collection Profile" - Daniel Haynes, Jessica Fitzgerald-McKay
2019-11-04, rev -00: This document specifies the Endpoint Posture Collection Profile, which describes the best practices for the application of IETF, TNC, and ISO/IEC data models, protocols, and...
View Article"Concise Software Identification Tags" - Henk Birkholz, Jessica...
2019-11-17, rev -13: ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and...
View Article"Endpoint Posture Collection Profile" - Daniel Haynes, Jessica Fitzgerald-McKay
2020-02-25, rev -01: This document specifies the Endpoint Posture Collection Profile, which describes the requirements for the application of IETF, TNC, and ISO/IEC data models, protocols, and...
View Article"Concise Software Identification Tags" - Henk Birkholz, Jessica...
2020-05-01, rev -15: ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and...
View Article"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...
2020-05-11, rev -06: This document defines an architecture enabling a cooperative Security Automation and Continuous Monitoring (SACM) ecosystem. This work is predicated upon information gleaned from...
View Article"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...
2020-09-10, rev -07: This document defines an architecture enabling a cooperative Security Automation and Continuous Monitoring (SACM) ecosystem. This work is predicated upon information gleaned from...
View Article