z-logo
open-access-imgOpen Access
Softwire Security Analysis and Requirements
Author(s) -
Shuichiro Yamamoto,
Chris­topher A. Williams,
Hayato Yokota,
Florence Parent
Publication year - 2009
Publication title -
rfc
Language(s) - English
Resource type - Reports
DOI - 10.17487/rfc5619
Subject(s) - computer security , confidentiality , vulnerability (computing) , computer science , authentication (law) , software deployment , security service , security testing , computer security model , security information and event management , information security , cloud computing security , software engineering , cloud computing , operating system
This document describes the security guidelines for the softwire "Hubsand Spokes" and "Mesh" solutions. Together with the discussion of thesoftwire deployment scenarios, the vulnerability to the securityattacks is analyzed to provide the security protection mechanism suchas authentication, integrity and confidentiality to the softwirecontrol and data packets.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom