... Model Peering relationship is used to provide charging between neighboring networks Similar to edge pricing proposed by Schenker et. al. NJ Turnpike Model ...
... provide inheritance information of each offending avp belonging to a group ? ... Issue 20: Determining an offending/invalid AVP contained within a grouped AVP ...
New Diameter Bootstrapping Application is used between, - the PAA/AAA Client and the AAA Server ... PANA exchange only between the PaC and the PAA/HA. ...
The new 'QoS NSLP Authorization Issues' draft does not replace the 'NSIS AAA' draft. ... Should a authorization request always travel to the user's home network? i.e. ...
GEOPRIV Policy draft-ietf-geopriv-policy draft-ietf-geopriv-common-policy Henning Schulzrinne Columbia University with J. Morris, H. Tschofenig, J. Cuellar, J. Polk ...
NAT/FW NSLP Implementation. Presentation given by Hannes Tschofenig. Implemented by Henning Peters ... Essential features are covered, including proxy modes (DS ...
This work is partly funded by Trilogy, a research project ... Matt Mathis, Bob Briscoe, Michael Welzl, Mark Handley, Gorry Fairhurst, Hannes Tschofenig, ...
Xiaoming Fu (Uni Goettingen) Henning Schulzrinne (Columbia Uni) Hannes Tschofenig (Siemens) ... Xiaoming Fu (fu@cs.uni-goettingen.de) Telematics group ...
Takako Sanda, Xiaoming Fu, Seong-Ho Jeong, Jukka Manner and Hannes Tschofenig ... Topics were divided into two categories, Main' and Further Study' ...
Tahoe Networks - Presented by Hannes Tschofenig. 7/14/2003. IETF57. Enabling IPsec Access control. PANA protocol - used to authenticate the client. ...
Use of CxTP for PANA. draft-bournelle-pana-ctp-03.txt. Julien Bournelle. Maryline Laurent-Maknavicius. Hannes Tschofenig. Yacine El Mghazli. Gerardo Giaretta ...
(with Robert Hancock, Hannes Tschofenig, S. van den Bosch, G. Karagiannis, A. ... The scaling bogeyman. Networks routinely handle large-scale per-flow state. firewalls ...
Prepaid Extensions to RADIUS (draft-lior-radius-prepaid-extensions-10.txt) ... K. Chowdhury Starent Networks. H. Tschofenig Siemens. A. Pashalidis Siemens ...
Takako Sanda, Xiaoming Fu, Seong-Ho Jeong, Jukka Manner and Hannes Tschofenig ... One out of all cases are explained in detail, and others are explained ...
Sung-Hyuck Lee, Seong-Ho Jeong, Hannes Tschofenig, Xiaoming Fu, Jukka Manner ... Which primitives need to be used in order for NTLP (GIST) to notify QoS-NSLP of ...
Sung-Hyuck Lee, Seong-Ho Jeong, Hannes Tschofenig, Xiaoming Fu, Jukka Manner ... How can dead peers be detected in a fast and efficient manner in mobility scenarios? ...
EAP-TLS-PSK. draft-otto-emu-eap-tls-psk-00.txt. Thomas Otto. Hannes Tschofenig ... EAP-TLSbis will be backward compatible and only support certificate-based ...
Diameter QoS. John, Pete, Avri, Glen, Tseno, Hannes, Tina. presented by Tina TSOU ... John, Pete, Avri, Glen, Tseno, Tina) worked out http://tools.ietf.org ...
... field consisting of vendor OID (0x000000=IETF) and 3-octet ciphersuite specifier ... Specifier. Key Derivation Function (KDF) GKDF-X (Y, Z) { M_0 = ''; result ...
Deployment problem (and again the EAP solution shows up as a possible solution) 5 ... End host does not care about the identity of a particular QoS router ...
analyses the usage of different security protocols (and credentials) with GIST. ... when the authenticated identity needs to be passed from the GIST to NSLPs and ...
... Add text to Geopriv using protocols (in particular to the ... Question: Why only available for Location Info? Other information is also privacy sensitive. ...
Siemens AG, Corporate Technology, CT IC 3. 81730 Munich, Germany. IETF #65 Dallas, SIPPING WG ... identity and in-band provided certificate to further bootstrap ...
... for methods that provide mutual authentication and keys. Avoid unnecessary PKIs ... First draft explores various alternatives how to implement this in IKEv2 ...
Location Server stores information about a particular subscriber or knows where ... Query contains the AVP codes that are desired for a given user. ...
2. At all? Three separable problems: #1: access to network resources to ... 2: no ... hoaxes, crank calls. Non-initialized devices. Unauthenticated ...
Official WG, first meeting in Minneapolis (IETF#62) on March 9 ... Weblog: http://www.ietf-ecrit.org. Narrowly chartered to deal with how to route emergency calls. ...
The choice of IPsec as the security mechanism for MIP6 was based on : ... for securing MIP6 signaling, has been one of the factors limiting the widespread use of MIP6. ...
(I.e. in-band signaling = adding QoS signaling information to a mobility protocol) ... Separation between session and flow identifier already provides a number of ...
All comments out of WGLC fixed in this version. Refined ... Ready by mid of April. WG to read document :-) Some more implementation feedback. Interop? ...
The IETF Extensible Authentication Protocol (EAP) Working Group IETF-63 in Paris, France Tuesday, August 2nd, 2005, 14:00-16:00 Room 342 Presentations and Issues on ...
Issue 18 & 6 - Threats discussion and when to do RR? Issue 2 - How MOBIKE and NAT-T work together ... Some candidates available. draft-eronen-mobike-mopo-00.txt ...
0. NAT/Firewall NSLP. IETF 61th November 2004. draft-ietf-nsis-nslp-natfw-04.txt ... Should there be switch for NI to decided which way? 5. Close Pinholes ...
Reminder. A TLS Extension. EAP transported within TLS handshake messages 'Finished' message means both handshake and authentication are complete, and ' ...
Paul Hoffman. Invited Presentations. New Security-Related Work in W3C. Stephen Farrell ... Doug Montgomery. Extensions to the Internet Threat Model. Lakshminath ...