Softwire Security Analysis and Requirements
Author(s) -
Shuichiro Yamamoto,
Christopher A. Williams,
Hayato Yokota,
Florence Parent
Publication year - 2009
Publication title -
rfc
Language(s) - English
Resource type - Reports
DOI - 10.17487/rfc5619
Subject(s) - computer security , confidentiality , vulnerability (computing) , computer science , authentication (law) , software deployment , security service , security testing , computer security model , security information and event management , information security , cloud computing security , software engineering , cloud computing , operating system
This document describes the security guidelines for the softwire "Hubsand Spokes" and "Mesh" solutions. Together with the discussion of thesoftwire deployment scenarios, the vulnerability to the securityattacks is analyzed to provide the security protection mechanism suchas authentication, integrity and confidentiality to the softwirecontrol and data packets.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom