Quantcast
Channel: Internet Drafts: sacm
Browsing all 112 articles
Browse latest View live
↧

"Definition of the ROLIE Software Descriptor Extension" - Stephen Banghart,...

2019-06-28, rev -07: This document uses the "information-type" extension point as defined in the Resource-Oriented Lightweight Information Exchange (ROLIE) [RFC8322] Section 7.1.2 to better support...

View Article


"Definition of the ROLIE Software Descriptor Extension" - Stephen Banghart,...

2019-07-22, rev -08: This document uses the "information-type" extension point as defined in the Resource-Oriented Lightweight Information Exchange (ROLIE) [RFC8322] Section 7.1.2 to better support...

View Article


"Concise Software Identification Tags" - Henk Birkholz, Jessica...

2019-07-25, rev -12: ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and...

View Article

"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...

2019-07-26, rev -02: This memo defines a Security Automation and Continuous Monitoring (SACM) architecture. This work is built upon [RFC8600], and is predicated upon information gleaned from SACM Use...

View Article

"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...

2019-09-06, rev -03: This memo defines a Security Automation and Continuous Monitoring (SACM) architecture. This work is built upon [RFC8600], and is predicated upon information gleaned from SACM Use...

View Article


"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...

2019-10-29, rev -04: This document defines an architecture enabling a cooperative Security Automation and Continuous Monitoring (SACM) ecosystem. This work is predicated upon information gleaned from...

View Article

"Endpoint Posture Collection Profile" - Daniel Haynes, Jessica Fitzgerald-McKay

2019-11-04, rev -00: This document specifies the Endpoint Posture Collection Profile, which describes the best practices for the application of IETF, TNC, and ISO/IEC data models, protocols, and...

View Article

"Concise Software Identification Tags" - Henk Birkholz, Jessica...

2019-11-17, rev -13: ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and...

View Article


"Endpoint Posture Collection Profile" - Daniel Haynes, Jessica Fitzgerald-McKay

2020-02-25, rev -01: This document specifies the Endpoint Posture Collection Profile, which describes the requirements for the application of IETF, TNC, and ISO/IEC data models, protocols, and...

View Article


"Concise Software Identification Tags" - Henk Birkholz, Jessica...

2020-05-01, rev -15: ISO/IEC 19770-2:2015 Software Identification (SWID) tags provide an extensible XML-based structure to identify and describe individual software components, patches, and...

View Article

"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...

2020-05-11, rev -06: This document defines an architecture enabling a cooperative Security Automation and Continuous Monitoring (SACM) ecosystem. This work is predicated upon information gleaned from...

View Article

"Security Automation and Continuous Monitoring (SACM) Architecture" - Adam...

2020-09-10, rev -07: This document defines an architecture enabling a cooperative Security Automation and Continuous Monitoring (SACM) ecosystem. This work is predicated upon information gleaned from...

View Article
Browsing all 112 articles
Browse latest View live