OAuth 2.0 Token Binding
|
|
- Cecil Doyle
- 6 years ago
- Views:
Transcription
1 OAuth 2.0 Token Binding Brian Campbe Michae B. Jones John Bradey IETF 99 Prague Juy 2017 from IETF 93 1
2 The Setting of the Context Provide an OAuth 2.0 proof-ofpossession mechanism based on Token Binding to defeat (re)pay of ost or stoen tokens (access, refresh, and 2 authorization codes) from IETF 99
3 Current Status Token Binding WG documents; -tokbind-negotiation, -tokbind-protoco, and -tokbind-https are a very cose to being Submitted to the IESG for Pubication Waiting for WG Chair Go-Ahead and/or Shepherd Writeup Pubished -04 of draft-ietf-oauth-token-binding on Juy 3 rd Minor editoria fixes Defined how to convey token binding information of an access token via RFC 7662 OAuth 2.0 Token Introspection Introspection Response Registration request for cnf is now in draft-ietf-oauth-mts, which wi ikey be pubished and registered before draft-ietf-oauth-token-binding Added an open issue about needing to aow for web server cients to opt-out of having refresh tokens bound whie sti aowing for binding of access tokens 3
4 Open Issues I (defying the conventiona wisdom about ots of text on a side) What shoud we do in the case that a refresh request for a token bound access token is received when the refresh token used in the request is not token bound? Currenty the ony way to request a token bound access token is via the referred token binding. By definition the referred token binding aso comes with the provided token binding and the provided token binding is what is used to bind the refresh token. However, web server cients wi typicay be distributed/ custered and very ikey wi not want to, or be capabe of, deaing with token bound refresh tokens. Such cients wi have credentias estabished with the AS for authenticating to the token endpoint and refresh tokens are aready bound to the cient. So token binding the refresh tokens doesn't add much, if anything, in this case. But accessing private token binding keys in a distributed system wi be cumbersome or even impossibe. Tracking and propery utiizing the association of a token binding key with each individua refresh token woud aso be exceptionay cumbersome (whereas cient credentias are for the cient and decouped from individua refresh tokens) but without some such mechanism the token binding key cannot be changed without impicity invaidating a the bound refresh tokens the web server cient has stored for that AS. It seems necessary to provide some mechanism for a cient to opt-out of having refresh tokens token bound whie sti aowing for token binding of access tokens. Potentia soutions: Togge behavior based on cient metadata Aow for a parameter to express the Token Binding ID to the token endpoint? (maybe usefu for other reasons) 4
5 Open Issues II Shoud the scope of this document incude standardization or guidance on token binding of JWT Cient Authentication and/or Authorization Grants from RFC 7523? The Metadata and what can and cannot be reiaby inferred from it need additiona evauation and work. OAuth 2.0 Protected Resource Metadata is no onger a going concern, but is currenty referenced herein. Booean vaues do not adequatey convey Token Binding support, as different components may support different key parameters types. And successfu negotiation ikey doesn't provide the appication ayer info about a the supported key parameters types but rather just the one that was negotiated. 5
6 Looking Ahead Token Binding documents progress to RFC Work through open issues Impementation experience and feedback Get the band back together again for IETF 100 in Singapore from IETF 93 6 from CIS Chicago
Neural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationAuthorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal
Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationInteraction between the Client and the Authorization Server (Symmetric Keys)
OAuth PoP Tokens REFRESHER Interaction between the Client and the Authorization Server (Symmetric Keys) +---------------+ ^ // Authorization / Server // / (I) // /+---------------+ Access / // Token /
More information3GPP TS V7.1.0 ( )
TS 29.199-7 V7.1.0 (2006-12) Technica Specification 3rd Generation Partnership Project; Technica Specification Group Core Network and Terminas; Open Service Access (OSA); Paray X Web Services; Part 7:
More informationInfinity Connect Web App Customization Guide
Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded
More informationHTTP Random Access and Live Resources IETF 100
HTTP Random Access and Live Resources IETF 1 Barbara Stark bs7652@att.com Darshak Thakore d.thakore@cabeabs.com Craig Pratt pratt@acm.org / craig@ecaspia.com Use existing bytes Range Unit with very arge
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationRDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*
RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures
More informationOAuth 2.0 Incremental Auth
OAuth 2.0 Incremental Auth IETF 99 Prague, July 2017 William Denniss Incremental Auth Problem Statement Asking for the kitchen sink of scopes up-front is a bad thing. Users should have the context of the
More informationPerformance Measurements of HPC-Applications at LRZ Gilbert Brietzke
Performance Measurements of HPC-Appications at LRZ Gibert Brietzke HPC Systems at LRZ 10 8 m 1 1m m 22 m 2 SuperMUC Architecture Performance Evauation: Toos A variety of performance measurement toos exist,
More informationSpecial Edition Using Microsoft Office Sharing Documents Within a Workgroup
Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing
More informationIETF Trust Report IETF-95
IETF Trust Report IETF-95 Benson Schiesser (Outgoing) IETF Trust Chair 2016-Apr-08 Trust Chair Eection Tobias Gondrom Eected Chair Effective 05-Apr-2016 2 Subpoenas and Lega Requests The IAOC Lega Committee
More informationComputer Networks. College of Computing. Copyleft 2003~2018
Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792
More informationComputing devices have become increasingly mobile at the client end, and the
Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationReadme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT
ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported
More informationMeeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers
Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using
More informationA METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds
A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed
More informationA Robust Sign Language Recognition System with Sparsely Labeled Instances Using Wi-Fi Signals
A Robust Sign Language Recognition System with Sparsey Labeed Instances Using Wi-Fi Signas Jiacheng Shang, Jie Wu Center for Networked Computing Dept. of Computer and Info. Sciences Tempe University Motivation
More information.County of San Mateo
-- - -- -- - -- - - --- a - -- w---- a- -- : m- I - -- -- -- --., I -- I.a, e mzzcm.county of San Mateo InterneUIntranet Web Page Design Guideines. September 30,1997 fabe of Corntents Purpose... Approach....
More informationThe Big Picture WELCOME TO ESIGNAL
2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for
More informationUMA and Dynamic Client Registration. Thomas Hardjono on behalf of the UMA Work Group
UMA and Dynamic Client Registration Thomas Hardjono on behalf of the UMA Work Group 1 UMA is... A web protocol that lets you control authorization of data sharing and service access made on your behalf
More informationBuilding the Web of Things
Buiding the Web of Things Interoperabiity for Connected Devices Dave Raggett W3C Track 14 Apri 2016 Many Potentia IoT Appication Areas each evoving rich capabiities Smart Homes Wearabes Heathcare Power
More informationUnixWare 7 System Administration UnixWare 7 System Configuration
UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration
More informationOperating Avaya Aura Conferencing
Operating Avaya Aura Conferencing Reease 6.0 June 2011 04-603510 Issue 1 2010 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationBGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco
BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe
More informationAvaya Aura Call Center Elite Multichannel Application Management Service User Guide
Avaya Aura Ca Center Eite Mutichanne Appication Management Service User Guide Reease 6.3 October 2013 2014 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts have been made to ensure that the
More informationIBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0
IBC DOCUMENT SA/STA SERIES User's Guide V7.0 Page 2 New Features for Version 7.0 Mutipe Schedues This version of the SA/STA firmware supports mutipe schedues for empoyees. The mutipe schedues are impemented
More informationFDA Registration Trials. Aisha Shah CRP Information Meeting, Conducting FDA Registration Trials
FDA Registration Trias Aisha Shah CRP Information Meeting, Conducting FDA Registration Trias November 1, 2018 Goas Registration Tria Considerations DTL and RCR AE Submissions Essentia Documents Protoco
More informationOverview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv!
Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv! ACME Overview! ACME is a protocol being developed in IETF for Automated Certificate Management.!
More informationDistance Weighted Discrimination and Second Order Cone Programming
Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and
More informationInternet Engineering Task Force (IETF) Request for Comments: Google Inc. October 2018
Internet Engineering Task Force (IETF) Request for Comments: 8472 Category: Standards Track ISSN: 2070-1721 A. Popov, Ed. M. Nystroem Microsoft Corp. D. Balfanz Google Inc. October 2018 Transport Layer
More informationIntroduction P2P Models Prisoners Dilemma Strategy- Proof Mech. Entrance Fees Comparison BitTorrent Structured LCP Routing
Procedure naysis Resuts (1) pproach that has been proposed. Subject of inspection: speed-critica user. P2P Modes iemma u Sift through code paths step by step (more specificay, composition of code paths
More informationAvaya one-x Mobile Pre-Installation Checklist
Avaya one-x Mobie 18-602133 Issue 1 November 2007 Avaya one-x Mobie November 2007 1 00A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete
More informationl A set is a collection of objects of the same l {6,9,11,-5} and {11,9,6,-5} are equivalent. l There is no first element, and no successor of 9.
Sets & Hash Tabes Week 13 Weiss: chapter 20 CS 5301 Spring 2018 What are sets? A set is a coection of objects of the same type that has the foowing two properties: - there are no dupicates in the coection
More informationHour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model
Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide
More informationData Management Updates
Data Management Updates Jenny Darcy Data Management Aiance CRP Meeting, Thursday, November 1st, 2018 Presentation Objectives New staff Update on Ingres (JCCS) conversion project Fina IRB cosure at study
More informationChapter 5: Transactions in Federated Databases
Federated Databases Chapter 5: in Federated Databases Saes R&D Human Resources Kemens Böhm Distributed Data Management: in Federated Databases 1 Kemens Böhm Distributed Data Management: in Federated Databases
More informationSimba MongoDB ODBC Driver with SQL Connector. Installation and Configuration Guide. Simba Technologies Inc.
Simba MongoDB ODBC Driver with SQL Instaation and Configuration Guide Simba Technoogies Inc. Version 2.0.1 February 16, 2016 Instaation and Configuration Guide Copyright 2016 Simba Technoogies Inc. A Rights
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationOracle Data Relationship Management
Orace Data Reationship Management Orace Data Reationship Steward Orace Data Reationship Management for Orace Hyperion Enterprise Panning Suite Orace Data Reationship Management for Orace Hyperion Financia
More informationAuthority Tokens for ACME. IETF 101 ACME WG Jon - London - Mar 2018
Authority Tokens for ACME IETF 101 ACME WG Jon - London - Mar 2018 STIR and ACME What is STIR? Secure Telephone Identity (Revisited) ART Area WG Providing cryptographic authentication for telephone calls
More informationMediaAUTH Draft Proposal
MediaAUTH Draft Proposal August 21, 2012 Contents 1 Introduction 2 2 Service & User Perspective 2 2.1 Login...................................... 2 2.2 Soft Login.................................... 3
More informationAddressing and Discovery Layer? >
US 20110265168A1 (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2011/0265168 A1 LUCOVSKY et a. (43) Pub. Date: (54) POLCY ENGNE FOR CLOUD PLATFORM Pubication Cassi?cation (75) nventors:
More informationNo connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.
UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure
More informationSpace-Time Trade-offs.
Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe
More informationImportance of Timely Data Submission
Importance of Timey Data Submission Shauna Himan Mayo Cinic CRP Information Session, November 2 nd, 2017 Presentation Objectives Iustrate the importance of data submission timeiness Communicate the status
More informationQuick Start Instructions
Eaton Power Xpert Gateway Minisot (PXGMS) UPS Card Quick Start Instructions Ethernet 10/100 Status DHCP EMP + - CMN 100 Act Ident Power PXGMS UPS Restart TX Setup RX Package Contents Power Xpert Gateway
More informationSolutions for Broadcast and Production. Loudness Measurement
Soutions for Broadcast and Production Loudness Measurement Loudness Anaysis Loudness Anaysis and Handing in TV and Radio Broadcast A reiabe and standardized method for evauating program oudness today is
More informationFast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model
Fast and effective dimensioning agorithm for end-toend optica burst switching networks with ON-OFF traffic mode Reinado Vaejos 1, Aejandra Zapata 1, Marco Aravena 2,1 1 Teematics Group, Eectronic Engineering
More informationTechnical Review THE BEST OF BBC iplayer. DAB Open Source Handheld. SVC Video Compression. EBU HD Codec Tests. EBU P2P Media Portal
THE BEST OF 2008 Technica Review BBC ipayer DAB Open Source Handhed SVC Video Compression EBU HD Codec Tests EBU P2P Media Porta EBU Audio over IP Wecome 3 Catch-up Radio & TV Evoution of the BBC ipayer
More informationA GENERAL PURPOSE FiYl=ERTEXT A6STRACT MACHINE
A GENERAL PURPOSE FiY=ERTEXT A6STRACT MACHNE BRAD CAMPBELL and JOSEPH M. GOODMAN The HAM is a transaction-based server for a hypertext storage system. The seruer is designed to hande mutipe uses in a networked
More informationIncremental Discovery of Object Parts in Video Sequences
Incrementa Discovery of Object Parts in Video Sequences Stéphane Drouin, Patrick Hébert and Marc Parizeau Computer Vision and Systems Laboratory, Department of Eectrica and Computer Engineering Lava University,
More informationAd Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks
Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks
More informationA Reference Model for Autonomic Networking draft-behringer-anima-reference-model-03.txt
A Reference Model for Autonomic Networking 93 rd IETF, 20 July 2015 Michael Behringer Brian Carpenter Toerless Eckert 1 Reference Model High Level View Autonomic Function B ASA ASA Registrar ASA ASAs deployed
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationstir-certs-02 IETF 93 (Prague) STIR WG Jon
stir-certs-02 IETF 93 (Prague) STIR WG Jon What we did since -01 Basic specification of the cert extension (TNAuthList) didn t change much here Cert scope may include one or more or many TNs Fleshed out
More informationMCSE Training Guide: Windows Architecture and Memory
MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the
More information(12) United States Patent (10) Patent N0.2 US 8,631,425 B2 Videlov (45) Date of Patent: Jan. 14, 2014
US008631425B2 (12) United States Patent (10) Patent N0.2 Videov (45) Date of Patent: Jan. 14, 2014 (54) METHOD FOR PROCESSING OF 5882/88 1,323 2}: 882 Ems e a1~ ~~~~~~~~~~~~~~~~~~~ ~~;;/13 1/j APPLICATION
More informationConflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks
Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Synchronization: Semaphore
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Synchronization: Synchronization Needs Two synchronization needs Mutua excusion Whenever mutipe threads access a shared data, you need to worry
More information1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation
1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation
More informationELITE 15 OWNER S MANUAL
The Eite 15 Features Linear Fitering Technoogy for unequaed audio / video carity Series Mode Protection for maintenance -free AC surge suppression Retractabe LED amps iuminate a cabinet or rack fu of equipment
More informationTopology-aware Key Management Schemes for Wireless Multicast
Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu
More informationpower-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues
DOI 10.1007/s11276-006-0010-9 802.11 power-saving mode for mobie computing in Wi-Fi hotspots: Limitations, enhancements and open issues G. Anastasi M. Conti E. Gregori A. Passarea C Science + Business
More informationLecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.
Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationControl Plane Based on SCIM API
Contro Pane Based on SCIM API draft-hunt-secevents-stream-mgmt-api Phi Hunt IETF100, Singapore November, 2017 Why not re-use? Why SCIM? SCIM2 is a provisioning protoco Based on JSON documents and RESTfu
More informationOpenID Connect Update
OpenID Connect Update May 14, 2013 Dr. Michael B. Jones Identity Standards Architect Microsoft Working Together OpenID Connect Working Group Members Key working group participants: Nat Sakimura Nomura
More informationECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006
ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos
More informationInternational Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement
Internationa Laboratory Accreditation Cooperation The ILAC Mutua Recognition Arrangement Enhancing the acceptance of products and services across nationa borders Removing barriers to goba trade Accreditation
More informationNetwork Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000
Network Working Group R. Droms INTERNET-DRAFT Bucknell University Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000 Procedure for Defining New DHCP Options and Message Types
More informationBasic segmentation from CT: proximal femur
Chapter 7 Basic segmentation from CT: proxima femur This tutoria wi demonstrate how to import DICOM data from a CT scan of a dry cadaveric femur and appy different fiters and segmentation toos. 7.1 What
More informationChapter 3: Windows 2000 TCP/IP Implementation Details
Chapter 3: Windows 2000 TCP/IP Impementation Detais Page 1 of 34 Chapter 3: Windows 2000 TCP/IP Impementation Detais Windows 2000 uses TCP/IP as the main communication protoco for buiding enterprise networks,
More informationGraphical User Interface Manual
DALF 1; Rev F Motor Contro Board Graphica User Interface Manua Revision 1.0.0 Feb 18, 2008 Embedded Eectronics Page 1 2/19/2008 Tabe of Contents 1 GUI APPLICATION OVERVIEW...3 1.1 COMMUNICATION...3
More informationFunctions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7
Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a
More informationHalf Year 2018 DDoS Trends Report
Haf Year 2018 DDoS Trends Report EXECUTIVE SUMMARY 3 Key Trends 7 Key Insights 12 Recommendations 14 Summary Organizations have become dependent on the Internet as a means to conduct business and deiver
More informationSpecial Edition Using Microsoft Excel Selecting and Naming Cells and Ranges
Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and
More informationAgreeYa Solutions. Site Administrator for SharePoint User Guide
AgreeYa Soutions Site Administrator for SharePoint 5.2.4 User Guide 2017 2017 AgreeYa Soutions Inc. A rights reserved. This product is protected by U.S. and internationa copyright and inteectua property
More informationTHE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM
17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic
More informationExabyte Tape Drives: Mammoth Technology
Exabyte Tape Drives: Mammoth Technoogy January 19, 1999 THIC Meeting at the SEATAC Marriott Seatte WA Key Scharf Exabyte Corp. 1685 38th Street Bouder CO 80301 +1-303-417-7205 emai: key@exabyte.com Mammoth
More informationReplication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs
Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,
More informationStaff Report. James Nakayama, Sergeant, Field Operations Division (925)
5.h Staff Report Date: May 24, 2016 To: From: Reviewed by: Prepared by: Subject: City Counci Vaerie J. Barone, City Manage Guy Swanger, Chief of Poice James Nakayama, Sergeant, Fied Operations Division
More informationAvaya Aura Call Center Elite Multichannel Configuration Server User Guide
Avaya Aura Ca Center Eite Mutichanne Configuration Server User Guide Reease 6.2.3/6.2.5 March 2013 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information
More informationFOR SERVICE TECHNICIAN S USE ONLY
W10600683C Assemby: W10611974 FOR SERVICE TECHNICIAN S USE ONLY NOTE: This sheet contains important Technica Service Data. Tech Sheet Do Not Remove Or Destroy DANGER Eectrica Shock Hazard Ony authorized
More informationindex.pdf March 17,
index.pdf March 17, 2013 1 ITI 1121. Introduction to omputing II Marce Turcotte Schoo of Eectrica Engineering and omputer Science Linked List (Part 2) Tai pointer ouby inked ist ummy node Version of March
More informationChapter 3: Introduction to the Flash Workspace
Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage
More informationAssertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
OAuth Working Group Internet-Draft Intended status: Standards Track Expires: August 4, 2014 B. Campbell Ping Identity C. Mortimore Salesforce M. Jones Y. Goland Microsoft January 31, 2014 Assertion Framework
More informationDevelopment of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim
Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities
More informationExtending IETF tools for Working Group Draft Tracking. WGDTspec BOF
Extending IETF tools for Working Group Draft Tracking WGDTspec BOF Friday, March 26, 2010 Ed Juskevicius and Russ Housley edj.etc@gmail.com housley@vigilsec.com Note Well Any submission to the IETF intended
More informationInternet Engineering Task Force (IETF) October This document establishes an IETF URN Sub-namespace for use with OAuth-related specifications.
Internet Engineering Task Force (IETF) Request for Comments: 6755 Category: Informational ISSN: 2070-1721 B. Campbell Ping Identity Corp. H. Tschofenig Nokia Siemens Networks October 2012 An IETF URN Sub-Namespace
More informationTRILL History Transparent Interconnection of Lots of Links
Transparent Interconnection of Lots of Links 1 Donad E. Eastake 3 rd Principa Engineer, Huawei d3e3e3@gmai.com What is TRILL? Basicay a simpe idea: Encapsuate native frames in a transport header providing
More informationAdministering Avaya Web Conferencing
Administering Avaya Web Conferencing Reease 5.2 Service Pack 2 October 31, 2012 04-603434 Issue 1 2012 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts have been made to ensure that the information
More informationHybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600. The intelligent business solution.
Hybrid IP-PBX Systems KX-TDA100 KX-TDA200 KX-TDA600 The inteigent business soution. Hybrid IP-PBX KX-TDA Teecommunication Patform: Investment in a teecommunication system requires business communication
More informationFrom i* to istar 2.0: An Evolving Social Modelling Language
From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, 100084, China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that
More information