2005
DOI: 10.17487/rfc4081
|View full text |Cite
|
Sign up to set email alerts
|

Security Threats for Next Steps in Signaling (NSIS)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2005
2005
2010
2010

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 5 publications
(5 reference statements)
0
14
0
Order By: Relevance
“…The underlying requirements for signaling in the context of NSIS are defined in [1] and a separate security threats document [2]; other related requirements can be found in [3] and [4] for QoS/Mobility and middlebox communication, respectively. This framework does not replace or update these requirements.…”
Section: Scope and Structure Of The Nsis Frameworkmentioning
confidence: 99%
See 3 more Smart Citations
“…The underlying requirements for signaling in the context of NSIS are defined in [1] and a separate security threats document [2]; other related requirements can be found in [3] and [4] for QoS/Mobility and middlebox communication, respectively. This framework does not replace or update these requirements.…”
Section: Scope and Structure Of The Nsis Frameworkmentioning
confidence: 99%
“…The routing of the messages should follow exactly the same path as the associated data flow (but see Section 5.1.1 on this point). Note that securing messages sent this way raises some interesting security issues (these are discussed in [2]). In addition, it is a matter of the protocol design what should be used as the source address of the message (the flow source or signaling source).…”
Section: | V +------------------+ +-------------------------mentioning
confidence: 99%
See 2 more Smart Citations
“…The application-specific protocols are referred to as NSIS Signalling Layer Protocols (NSLPs), and are defined in separate documents. The NSIS framework [29] and the accompanying threats document [30] provide important background RFC 5971 GIST October 2010…”
Section: Introductionmentioning
confidence: 99%