Key Management Interoperability Protocol Tape Library Profile Version 1.0
|
|
- Teresa Gardner
- 5 years ago
- Views:
Transcription
1 Key Management Interoperability Protocol Tape Library Profile Version 1.0 Working Draft April 2013 Technical Committee: OASIS Key Management Interoperability Protocol (KMIP) TC Chairs: Robert Griffin EMC Corporation Subhash Sankuratripati NetApp Editors: Tim Hudson Cryptsoft Stan Feather Hewlett-Packard Rod Wideman Quantum Related work: This specification is related to: Key Management Interoperability Protocol Profiles Version October OASIS Standard. Key Management Interoperability Protocol Specification Version January OASIS Standard. Abstract: Describes a profile for Tape Libraries as KMIP clients interacting with KMIP servers Status: This Working Draft (WD) has been produced by one or more TC Members; it has not yet been voted on by the TC or approved as a Committee Draft (Committee Specification Draft or a Committee Note Draft). The OASIS document Approval Process begins officially with a TC vote to approve a WD as a Committee Draft. A TC may approve a Working Draft, revise it, and reapprove it any number of times as a Committee Draft. Copyright OASIS Open All Rights Reserved. All capitalized terms in the following text have the meanings assigned to them in the OASIS Intellectual Property Rights Policy (the "OASIS IPR Policy"). The full Policy may be found at the OASIS website. This document and translations of it may be copied and furnished to others, and derivative works that comment on or otherwise explain it or assist in its implementation may be prepared, copied, published, and distributed, in whole or in part, without restriction of any kind, provided that the above copyright notice and this section are included on all such copies and derivative works. However, this document itself may not be modified in any way, including by removing the copyright notice or references to OASIS, except as needed for the purpose of developing any document or deliverable produced by an OASIS Technical Committee (in which case the rules applicable to copyrights, as set forth in the OASIS IPR Policy, must be followed) or as required to translate it into languages other than English. The limited permissions granted above are perpetual and will not be revoked by OASIS or its successors or assigns. This document and the information contained herein is provided on an "AS IS" basis and OASIS DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY OWNERSHIP RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 1 of 17
2 Table of Contents 1 Introduction Terminology Normative References Non-Normative References Tape Library Profile Authentication Suite Baseline Tape Library Using Application Specific Information for Key Identifiers Tape Library Profile Test Cases Mandatory Test Cases... 8 TL-M-1 - Configuration... 8 TL-M-2 - Write with new (Created) Key... 9 TL-M-3 - Read from Tape TL-M-4 Appended Write Optional Test Cases Appendix A. Acknowledgments Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 2 of 17
3 1 Introduction For normative definition of the elements of KMIP see the KMIP Specification ([KMIP-SPEC-1_0 and KMIP-SPEC-1_1]) and the KMIP Profiles ([KMIP-PROF-1_0 and KMIP-PROF-1_1]). Illustrative guidance for the implementation of KMIP clients and servers is provided in the KMIP Usage Guide ([KMIP-UG]) and KMIP Use Cases ([KMIP-UC]) and KMIP Test Cases ([KMIP-TC]). This profile defines the necessary KMIP functionality that a Tape Library operating as a KMIP client SHALL use and a KMIP server conforming to this profile SHALL support in order to interoperate in conformance with this profile. 1.1 Terminology The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL in this document are to be interpreted as described in [RFC2119]. Key Associated Data (KAD) Hexadecimal Numeric Characters N(a) N(u) Part of the tape format. May be segmented into authenticated and unauthenticated fields. KAD usage is detailed in the SCSI SSC-3 standard from the T10 organization available as ANSI INCITS Case-sensitive, printable, single byte ASCII characters representing the numbers 0 through 9 and uppercase alpha A through F. (US-ASCII characters 30h-39h and 41h-46h). Each byte (single 8-bit numeric value) is represented as two hexadecimal numeric characters with the highnibble represented by the first (left-most) hexadecimal numeric character and the low-nibble represented by the second (right-most) hexadecimal numeric character. The maximum number of bytes in the tape authenticated KAD field. For LTO4, N(a) is 12 bytes. For LTO5, N(a) is 60 bytes. The maximum number of bytes in the tape unauthenticated KAD field. For LTO4, N(u) is 32 bytes. For LTO5, N(u) is 32 bytes. N(k) The maximum number of bytes in the tape format KAD fields i.e. N(a) + N(u). For LTO4, N(k) is 44 bytes. For LTO5, N(k) is 92 bytes. 1.2 Normative References [RFC2119] S. Bradner, Key words for use in RFCs to Indicate Requirement Levels, IETF RFC 2119, March [RFC2246] T. Dierks and C. Allen, The TLS Protocol, Version 1.0, IETF RFC 2246, Jan 1999, [KMIP-SPEC-1_0] Key Management Interoperability Protocol Specification Version OASIS Standard, October Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 3 of 17
4 [KMIP-SPEC-1_1] Key Management Interoperability Protocol Specification Version Candidate OASIS Standard September [KMIP-PROF-1_0] Key Management Interoperability Protocol Usage Guide Version OASIS Standard. 1 October [KMIP-PROF-1_1] Key Management Interoperability Protocol Usage Guide Version Candidate OASIS Standard September Non-Normative References [KMIP-UG] Key Management Interoperability Protocol Usage Guide Version Committee Note Draft, 1 December 2011, [KMIP-TC] Key Management Interoperability Protocol Test Cases Version Committee Note Draft, 1 December [KMIP-UC] Key Management Interoperability Protocol Use Cases Version doc, Committee Specification, 15 June Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 4 of 17
5 2 Tape Library Profile The Tape Library Profile is a tape library operating as a KMIP client interacting with a KMIP server. 2.1 Authentication Suite Implementations conformant to this profile SHALL support at least one of the Authentication Suites defined within section 3 of KMIP Profiles ([KMIP-PROF-1_0] and/or [KMIP-PROF-1_1]). The establishment of the trust relationship between the KMIP client and the KMIP server is the same as the defined base profiles for the version of the profile supported. 2.2 Baseline Tape Library KMIP clients conformant to this profile: 1. SHALL conform to the KMIP Baseline Client profile in KMIP Profiles ([KMIP-PROF-1_0] and/or [KMIP-PROF-1_1]) and the KMIP Specification [KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 2. SHALL support Application Specific Information with Application Data provided by the client in accordance with the algorithm specified in this profile. 3. SHOULD NOT use custom attributes that duplicate information that is already in standard KMIP attributes 4. MAY use x-barcode as the custom attribute of type Textstring to store the barcode KMIP servers conformant to this profile SHALL: 1. Conform to the KMIP Baseline Server profile in KMIP Profiles ([KMIP-PROF-1_0] and/or [KMIP- PROF-1_1]) and the KMIP Specification [KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 2. Support the following additional objects a. Symmetric Key ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 2.2.2) 3. Support the following client-to-server operations: a. Create ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 4.1) 4. Support the following subsets of enumerated attributes: a. Cryptographic Algorithm Enumeration ([KMIP-SPEC-1_0] and/or [KMIP-SPEC- 1_1] ) i. AES b. Object Type Enumeration ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] ) i. Symmetric Key c. Key Format Type Enumeration ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] ) i. Raw d. Cryptographic Length ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 3.5) i. 256-bit 5. Support the following subsets of Name Types ([KMIP-SPEC-1_0] 3.2 and and/or [KMIP-SPEC-1_1] 3.2 and ) a. Uninterpreted Text String 6. Support custom attributes (client specified x-customattributename) with the following data types and properties: a. TextString Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 5 of 17
6 b. Integer c. DateTime 7. Support a minimum length of 256 characters for custom attribute values where the custom attribute type is of variable length. 8. Support a minimum of 30 custom attributes per managed object 9. Support a minimum of 64 characters in customer attribute names 10. Support a Batch Order Option ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 6.12) setting of True. 11. Support a Batch Count ([KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] 6.14) setting of at least Support the Test Library Profile Test Cases returning results consistent with the test cases. 13. Optionally support any clause within [KMIP-SPEC-1_0] and/or [KMIP-SPEC-1_1] that is not listed above 14. Optionally support extensions outside the scope of this standard (e.g., vendor extensions, conformance clauses) that do not contradict any KMIP requirements. 2.3 Using Application Specific Information for Key Identifiers This information applies to Tape Libraries that support usage of the Application Specific Information attribute to store key identifiers. The Application Specific Information (ASI) attribute SHALL be used to store data that is specific to the application (tape library) using the object. The following Application Namespaces are recommended and SHOULD be used in the Application Namespace field of the Application Specific Information attribute: LIBRARY-LTO, LIBRARY-LTO4, LIBRARY-LTO5, and LIBRARY-LTO6 For backwards compatibility with deployed Tape Library implementations servers MAY elect to support VENDOR-LIBRARY-LTO as an Application Namespace where VENDOR is an ASCII string that SHALL not be further interpreted and SHALL be handled by the server as if the Application Namespace was set to LIBRARY-LTO. ASI supports key identifiers being created either on the Server or on the Client (Tape Library), but not both. The ASI method of key identification relies on the ability to uniquely identify a key based (preferably) only on its Application Data, or (alternatively) on some combination of Application Data and custom attributes, which the key creator guarantees to be unique within the Application Namespace. Claiming support for non-vendor-specific namespaces SHALL therefore ensure uniqueness across any LTO implementation, and is preferred for maximum interoperability. Key identifiers stored in the KMIP server's ASI attribute are always in ASCII format. Key identifiers stored in the KMIP client's tape format KAD fields are always numeric format. The method provides a specific algorithm for converting between text and numeric formats. All information contained in the tape format s KAD fields is converted to an ASCII string consisting of hexadecimal numeric character pairs. First, the unauthenticated KAD is converted to text. Second, the authenticated KAD is converted to text and is then concatenated to the end of the converted unauthenticated KAD text. For KMIP clients and servers conforming to this profile, Application Specific Information data SHALL be sent by the tape library KMIP client based on the tape format's KAD fields as follows: 1. Define an empty output buffer sufficient to contain a string with a maximum length of 2*N(k) bytes. 2. Copy the tape format s unauthenticated KAD (if present) to the output buffer converting each byte value to exactly two Hexadecimal Numeric Characters. Effectively, the first byte (byte 0) of the input buffer is the first byte of unauthenticated KAD. 3. Concatenate the tape format s authenticated KAD to the output buffer converting each byte value to exactly two Hexadecimal Numeric Characters. Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 6 of 17
7 Note: the contents of unauthenticated KAD and authenticated KAD fields may be less than the maximum permitted lengths; the implementation provides the correct length values to use in the algorithm rather than using fixed maximum length fields. Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 7 of 17
8 3 Tape Library Profile Test Cases This section documents the test cases that a client or server conformant to the Tape Library Profile SHALL support. Note: the values for the returned items and the custom attributes are illustrative. Actual values from a real client system will vary. These test cases demonstrate usage of all of the mandatory types that are required to be supported in a server implementation. 3.1 Mandatory Test Cases This section documents the test cases that a client or server conformant to the Tape Library Profile SHALL support. TL-M-1 - Configuration Determine server configuration details including operations supported (only the mandatory operations are listed in the response example), objects supported (only the mandatory objects types are listed in the response example), optional server information, and optional list of application name spaces. Time Request/Response messages 0 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="1"/> </RequestHeader> <Operation type="enumeration" value="query"/> <QueryFunction type="enumeration" value="queryoperations"/> <QueryFunction type="enumeration" value="queryobjects"/> <QueryFunction type="enumeration" value="queryserverinformation"/> <QueryFunction type="enumeration" value="queryapplicationnamespaces"/> </RequestMessage> <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t21:35:17+00:00"/> <BatchCount type="integer" value="1"/> </ResponseHeader> <Operation type="enumeration" value="query"/> <Operation type="enumeration" value="query"/> <Operation type="enumeration" value="destroy"/> <Operation type="enumeration" value="get"/> <Operation type="enumeration" value="create"/> <Operation type="enumeration" value="register"/> <Operation type="enumeration" value="getattributes"/> <Operation type="enumeration" value="getattributelist"/> <Operation type="enumeration" value="addattribute"/> <Operation type="enumeration" value="modifyattribute"/> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 8 of 17
9 <Operation type="enumeration" value="deleteattribute"/> <Operation type="enumeration" value="activate"/> <Operation type="enumeration" value="revoke"/> <Operation type="enumeration" value="check"/> <ObjectType type="enumeration" value="symmetrickey"/> <ObjectType type="enumeration" value="template"/> <VendorIdentification type="textstring" value="server-vendor.com"/> <ApplicationNamespace type="textstring" value="lto"/> <ApplicationNamespace type="textstring" value="library-lto"/> </ResponseMessage> TL-M-2 - Write with new (Created) Key This case could occur when the Write operation starts with the first block on a tape. The implementation may choose which Write operations qualify for a creation of a new key. Regardless of the initiating circumstances, the Tape Library requests the server to create a new AES-256 symmetric key with appropriate identifying information which is unique within the Application Namespace. Additional custom attributes MAY be specified in order to: - ensure uniqueness of the key identifier when later Locating the key via ASI - provide human-readable information (such as the tape Barcode value) - information to support client-specific purposes Time Request/Response messages 0 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="2"/> </RequestHeader>o <Operation type="enumeration" value="create"/> <ObjectType type="enumeration" value="symmetrickey"/> <TemplateAttribute> <AttributeName type="textstring" value="name"/> <NameValue type="textstring" value="aaaaaaa1a1aa "/> <NameType type="enumeration" value="uninterpretedtextstring"/> <AttributeName type="textstring" value="cryptographic Algorithm"/> <AttributeValue type="enumeration" value="aes"/> <AttributeName type="textstring" value="cryptographic Length"/> <AttributeValue type="integer" value="256"/> <AttributeName type="textstring" value="cryptographic Usage Mask"/> <AttributeValue type="integer" value="decrypt Encrypt"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 9 of 17
10 value=" abcdef abcdef abcdef "/> <AttributeName type="textstring" value="x-vendorattribute1"/> <AttributeValue type="textstring" value="xxa012a1"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeValue type="integer" value="0"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeValue type="datetime" value=" t22:08:19+00:00"/> </TemplateAttribute> <Operation type="enumeration" value="get"/> </RequestMessage> <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t21:41:46+00:00"/> <BatchCount type="integer" value="2"/> </ResponseHeader> <Operation type="enumeration" value="create"/> <ObjectType type="enumeration" value="symmetrickey"/> <Operation type="enumeration" value="get"/> <ObjectType type="enumeration" value="symmetrickey"/> <SymmetricKey> <KeyBlock> <KeyFormatType type="enumeration" value="raw"/> <KeyValue> <KeyMaterial type="bytestring" value="2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a"/> </KeyValue> <CryptographicAlgorithm type="enumeration" value="aes"/> <CryptographicLength type="integer" value="256"/> </KeyBlock> </SymmetricKey> </ResponseMessage> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 10 of 17
11 TL-M-3 - Read from Tape Read an encrypted tape. The Tape Library constructs an identifier string based on the method in 2.3, then requests the server to Locate that string via ASI. A Get is then requested based on the key s unique identifier. The Tape Library MAY update attributes associated with the Symmetric Key Managed Object. The following example shows extensive use of custom attributes. Custom attributes are not required if the Application Name is unique within the Application Namespace. An implementation may also use custom attributes for vendor-unique purposes, or to improve usability. Time Request/Response messages 0 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="2"/> </RequestHeader> <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <Operation type="enumeration" value="get"/> </RequestMessage> <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t22:00:32+00:00"/> <BatchCount type="integer" value="2"/> </ResponseHeader> <Operation type="enumeration" value="get"/> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 11 of 17
12 <ObjectType type="enumeration" value="symmetrickey"/> <SymmetricKey> <KeyBlock> <KeyFormatType type="enumeration" value="raw"/> <KeyValue> <KeyMaterial type="bytestring" value="2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a2a"/> </KeyValue> <CryptographicAlgorithm type="enumeration" value="aes"/> <CryptographicLength type="integer" value="256"/> </KeyBlock> </SymmetricKey> </ResponseMessage 1 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="2"/> </RequestHeader> <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <Operation type="enumeration" value="getattributelist"/> </RequestMessage> <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t22:00:33+00:00"/> <BatchCount type="integer" value="2"/> </ResponseHeader> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 12 of 17
13 <Operation type="enumeration" value="getattributelist"/> <AttributeName type="textstring" value="x-barcode"/> <AttributeName type="textstring" value="x-vendorattribute1"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeName type="textstring" value="unique Identifier"/> <AttributeName type="textstring" value="object Type"/> <AttributeName type="textstring" value="cryptographic Algorithm"/> <AttributeName type="textstring" value="cryptographic Length"/> <AttributeName type="textstring" value="application Specific Information"/> <AttributeName type="textstring" value="cryptographic Usage Mask"/> <AttributeName type="textstring" value="digest"/> <AttributeName type="textstring" value="initial Date"/> <AttributeName type="textstring" value="last Change Date"/> <AttributeName type="textstring" value="lease Time"/> <AttributeName type="textstring" value="name"/> <AttributeName type="textstring" value="state"/> </ResponseMessage> 2 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="2"/> </RequestHeader> <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <Operation type="enumeration" value="getattributes"/> </RequestMessage <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t22:00:32+00:00"/> <BatchCount type="integer" value="2"/> </ResponseHeader> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 13 of 17
14 <Operation type="enumeration" value="getattributes"/> <AttributeName type="textstring" value="x-vendorattribute1"/> <AttributeValue type="textstring" value="xxa012a1"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeValue type="datetime" value=" t22:08:19+00:00"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeValue type="integer" value="0"/> <AttributeName type="textstring" value="unique Identifier"/> <AttributeValue type="textstring" value="12345abc d-be9c- <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="cryptographic Algorithm"/> <AttributeValue type="enumeration" value="aes"/> <AttributeName type="textstring" value="cryptographic Length"/> <AttributeValue type="integer" value="256"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <AttributeName type="textstring" value="cryptographic Usage Mask"/> <AttributeValue type="integer" value="decrypt Encrypt"/> <AttributeName type="textstring" value="digest"/> <HashingAlgorithm type="enumeration" value="sha_256"/> <DigestValue type="bytestring" value="0bd3d7ada745e4eb34cc9d26cc84d4852a15906b2f77f80d01fc31c28108c49b"/> <AttributeName type="textstring" value="initial Date"/> <AttributeValue type="datetime" value=" t21:41:46+00:00"/> <AttributeName type="textstring" value="last Change Date"/> <AttributeValue type="datetime" value=" t21:41:46+00:00"/> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 14 of 17
15 <AttributeName type="textstring" value="lease Time"/> <AttributeValue type="interval" value="3600"/> <AttributeName type="textstring" value="name"/> <NameValue type="textstring" value="aaaaaaa1a1aa "/> <NameType type="enumeration" value="uninterpretedtextstring"/> <AttributeName type="textstring" value="state"/> <AttributeValue type="enumeration" value="preactive"/> </ResponseMessage> 3 <RequestMessage> <RequestHeader> <BatchOrderOption type="boolean" value="true"/> <BatchCount type="integer" value="3"/> </RequestHeader> <AttributeName type="textstring" value="object Type"/> <AttributeValue type="enumeration" value="symmetrickey"/> <AttributeName type="textstring" value="application Specific Information"/> <ApplicationNamespace type="textstring" value="library-lto"/> <ApplicationData type="textstring" value=" abcdef abcdef abcdef "/> <Operation type="enumeration" value="modifyattribute"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeValue type="datetime" value=" t22:27:06+00:00"/> <Operation type="enumeration" value="modifyattribute"/> <UniqueBatchItemID type="bytestring" value="03"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeValue type="integer" value="1"/> </RequestMessage> Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 15 of 17
16 <ResponseMessage> <ResponseHeader> <TimeStamp type="datetime" value=" t22:00:33+00:00"/> <BatchCount type="integer" value="3"/> </ResponseHeader> <Operation type="enumeration" value="modifyattribute"/> <AttributeName type="textstring" value="x-vendorattribute2"/> <AttributeValue type="datetime" value=" t22:27:06+00:00"/> <Operation type="enumeration" value="modifyattribute"/> <UniqueBatchItemID type="bytestring" value="03"/> <AttributeName type="textstring" value="x-vendorattribute3"/> <AttributeValue type="integer" value="1"/> </ResponseMessage> TL-M-4 Appended Write his operation appends data to existing data on a tape. It does not introduce new KMIP operations beyond those noted in TL-M-2 and/or TL-M-3. Time 0 Request/Response messages 3.2 Optional Test Cases This section documents the test cases that a client or server conformant to the Tape Library Profile MAY support. [[ TO BE ADDED IF REQUIRED OR REMOVED AS A SECTION]] Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 16 of 17
17 Appendix A. Acknowledgments The following individuals have participated in the creation of this specification and are gratefully acknowledged: TBD Standards Track Draft Copyright OASIS Open All Rights Reserved. Page 17 of 17
KMIP Tape Library Profile Version 1.0
KMIP Tape Library Profile Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 09 January 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-tape-lib-profile/v1.0/csprd01/kmip-tape-lib-profile-v1.0-
More informationKMIP Tape Library Profile Version 1.0
KMIP Tape Library Profile Version 1.0 Committee Specification Draft 02 / Public Review Draft 02 19 June 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-tape-lib-profile/v1.0/csprd02/kmip-tape-lib-profile-v1.0-
More informationKMIP Opaque Managed Object Store Profile Version 1.0
KMIP Opaque Managed Object Store Profile Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 09 January 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-opaque-obj-profile/v1.0/csprd01/kmip-opaque-obj-profilev1.0-csprd01.doc
More informationKMIP Storage Array with Self-Encrypting Drives Profile Version 1.0
KMIP Storage Array with Self-Encrypting Drives Profile Version 1.0 Committee Specification Draft 02 / Public Review Draft 02 19 June 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-sa-sed-profile/v1.0/csprd02/kmip-sa-sed-profile-v1.0-
More informationKMIP Symmetric Key Lifecycle Profile Version 1.0
KMIP Symmetric Key Lifecycle Profile Version 1.0 OASIS Standard 19 May 2015 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-sym-key-profile/v1.0/os/kmip-sym-key-profile-v1.0-os.doc
More informationKMIP Opaque Managed Object Store Profile Version 1.0
KMIP Opaque Managed Object Store Profile Version 1.0 OASIS Standard 19 May 2015 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-opaque-obj-profile/v1.0/os/kmip-opaque-obj-profile-v1.0-
More informationKey Management Interoperability Protocol HTTPS Profile Version 1.0
Key Management Interoperability Protocol HTTPS Profile Version 1.0 Working Draft 04 27 June 2012 Technical Committee: OASIS Key Management Interoperability Protocol (KMIP) TC Chairs: Robert Griffin (robert.griffin@rsa.com),
More informationKey Management Interoperability Protocol Crypto Profile Version 1.0
Key Management Interoperability Protocol Crypto Profile Version 1.0 Working Draft 0708 25 7 NovemberOctober 2012 Technical Committee: OASIS Key Management Interoperability Protocol (KMIP) TC Chairs: Robert
More informationKMIP Additional Message Encodings Version 1.0
KMIP Additional Message Encodings Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 09 January 2014 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-addtl-msg-enc/v1.0/csprd01/kmip-addtl-msg-enc-v1.0-
More informationKMIP Post-Quantum Cryptography Profile Working Draft 02
KMIP Post-Quantum Cryptography Profile Working Draft 02 OASIS Working Draft 9 May 2017 Specification URIs This version: Latest version: Technical Committee: OASIS Key Management Interoperability
More informationXML Message Encoding Examples
XML Message Encoding Examples Hal Lockhart - Oracle Tim Hudson Cryptsoft Hal Lockhart - hal.lockhart@oracle.com Tim Hudson tjh@cryptsoft.com Goals TTLV -> XML and XML -> TTLV round tripping Simple automated
More informationKMIP Additional Message Encodings Version 1.0
KMIP Additional Message Encodings Version 1.0 OASIS Standard 19 May 2015 Specification URIs This version: http://docs.oasis-open.org/kmip/kmip-addtl-msg-enc/v1.0/os/kmip-addtl-msg-enc-v1.0-os.doc (Authoritative)
More informationKey Management Interoperability Protocol Use Cases Version 1.0
Key Management Interoperability Protocol Use Cases Version 1.0 Committee Draft 09 / Public Review 02 18 March 2010 Specification URIs: This Version: http://docs.oasis-open.org/kmip/usecases/v1.0/cd09/kmip-usecases-1.0-cd-09.html
More informationOpen Command and Control (OpenC2) Language Specification. Version 0.0.2
Open Command and Control (OpenC2) Language Specification Version 0.0.2 OpenC2 Language Specification Working Draft 0.0.2 09 Oct 2017 Technical Committee: OASIS OpenC2 Technical Committee Chair: Editors:
More informationSAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0
SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 Working Draft 03 9 December 2016 Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono (hardjono@mit.edu),
More informationAdvanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0
Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0 Working Draft 05 2 April 2014 Technical Committee: OASIS Advanced Message Queuing Protocol (AMQP) Bindings and Mappings (AMQP-
More informationSAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0
SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 Working Draft 01 23 November 2016 Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono ( hardjono@mit.edu
More informationUsing the AMQP Anonymous Terminus for Message Routing Version 1.0
Using the AMQP Anonymous Terminus for Message Routing Version 1.0 Committee Specification 01 Specification URIs This version: http://docs.oasis-open.org/amqp/anonterm/v1.0/cs01/.xml (Authoritative) http://docs.oasis-open.org/amqp/anonterm/v1.0/cs01/.html
More informationOASIS - Artifact naming guidelines
OASIS - Artifact naming guidelines Working Draft 06, 9 July 2004 Document identifier: Location: http://www.oasis-open.org/apps/org/workgroup/tab/documents.php Editor: Tim Moses Contributors: William Cox
More informationSAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0
SAML v2.0 Protocol Extension for Requesting Attributes per Request Version 1.0 Working Draft 01 23 November 2016 Technical Committee: OASIS Security Services (SAML) TC Chairs: Thomas Hardjono ( hardjono@mit.edu
More informationDeployment Profile Template Version 1.0 for WS-Reliability 1.1
Deployment Profile Template Version 1.0 for WS-Reliability 1.1 Committee Draft 11 April 2007 URIs: This Version: http://docs.oasis-open.org/wsrm/profile/wsr-deployment-profile-template-cd.pdf Latest Version:
More informationAbstract Code-Signing Profile of the OASIS Digital Signature Services
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 Abstract Code-Signing Profile of the OASIS Digital Signature Services OASIS Standard 11 April 2007 Specification
More informationLevel of Assurance Authentication Context Profiles for SAML 2.0
2 3 4 5 Level of Assurance Authentication Context Profiles for SAML 2.0 Draft 01 01 April 2008 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Specification URIs: This
More informationAdvanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0
Advanced Message Queuing Protocol (AMQP) WebSocket Binding (WSB) Version 1.0 Working Draft 08 7 March 2016 Technical Committee: OASIS Advanced Message Queuing Protocol (AMQP) Bindings and Mappings (AMQP-
More informationTest Assertions for the SCA Web Service Binding Version 1.1 Specification
Test Assertions for the SCA Web Service Binding Version 1.1 Specification Working Draft 02 7 October 2009 Specification URIs: This Version: http://docs.oasis-open.org/sca-bindings/sca-wsbinding-1.1-test-assertions-cd01.html
More informationTestCases for the SCA Assembly Model Version 1.1
TestCases for the SCA Assembly Model Version 1.1 Committee Specification Draft 04 / Public Review Draft 03 21 June 2011 Specification URIs This version: http://docs.oasis-open.org/opencsa/sca-assembly/sca-assembly-1.1-testcases-csprd03.pdf
More informationSAML V2.0 Profile for Token Correlation
SAML V2.0 Profile for Token Correlation Committee Draft 01 28 June 2010 Specification URIs: This Version: 0.1 Previous Version: 0 Latest Version: Technical Committee: OASIS Security Services TC Chair(s):
More informationInteroperable Key Management for Storage. PRESENTATION TITLE GOES HERE Subhash Sankuratripa8, NetApp (Co- Chair KMIP) Tim Hudson, CryptsoD
Interoperable Key Management for Storage PRESENTATION TITLE GOES HERE Subhash Sankuratripa8, NetApp (Co- Chair KMIP) Tim Hudson, CryptsoD Abstract! A standard for interoperable key management exists but
More informationOASIS Specification Document Template Usage
OASIS Specification Document Template Usage Working Draft, October 18, 2004 Document Identifier: oasis-spectools-1.0-word-sample-draft-01.doc OASIS Identifier: [OASIS document number] Location: Persistent:
More informationSCA JMS Binding v1.1 TestCases Version 1.0
SCA JMS Binding v1.1 TestCases Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 8 November 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-bindings/sca-jmsbinding-1.1-testcases-1.0-csprd01.html
More informationKey Management Interoperability Protocol Profiles Version 1.4
Key Management Interoperability Protocol Profiles Version 1.4 OASIS Standard 22 November 2017 Specification URIs This version: http://docs.oasis-open.org/kmip/profiles/v1.4/os/kmip-profiles-v1.4-os.docx
More informationXDI Requirements and Use Cases
1 2 3 XDI Requirements and Use Cases Working Draft 01, April 19 th 2004 4 5 6 7 8 9 10 11 12 13 14 Document identifier: xdi-requirements-and-use-cases-document-04 Location: Editors: [Editors listed here]
More informationTest Assertions for the SCA Assembly Model Version 1.1 Specification
Test Assertions for the SCA Assembly Model Version 1.1 Specification Committee Draft 03 10 August 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-assembly/sca-assembly-1.1-test-assertions-cd03.html
More informationSAML V2.0 EAP GSS SSO Profile Version 1.0
SAML V2.0 EAP GSS SSO Profile Version 1.0 Committee Draft 00 March 18, 2010 Specification URIs: This Version: http://docs.oasis-open.org/[tc-short-name]/[additional path/filename].html http://docs.oasis-open.org/[tc-short-name]/[additional
More informationSCA-J POJO Component Implementation v1.1 TestCases Version 1.0
SCA-J POJO Component Implementation v1.1 TestCases Version 1.0 Committee Specification Draft 01 / Public Review Draft 01 8 November 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-j/sca-j-pojo-ci-1.1-testcases-1.0-csprd01.html
More informationSAML V2.0 Profile for Mandator Credentials
2 SAML V2.0 Profile for Mandator Credentials 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Specification URIs: This Version: Previous Version: Latest Version: Technical
More informationService Component Architecture Client and Implementation Model for C++ Test Cases Version 1.1
Service Component Architecture Client and Implementation Model for C++ Test Cases Version 1.1 Committee Draft 02 14 October 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-c-cpp/sca-cppcni-1.1-testcases-cd02.html
More informationIdentity in the Cloud PaaS Profile Version 1.0
Identity in the Cloud PaaS Profile Version 1.0 Committee Note Draft 01 / Public Review Draft 01 29 April 2013 Work Product URIs This is a Non-Standards Track Work Product. The patent provisions of the
More informationOpenOffice Specification Sample
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 OpenOffice Specification Sample Working Draft 02, 14 April 2004 Document identifier: spectools-openoffice-sample-draft-02
More informationXACML Profile for Requests for Multiple Resources
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 XACML Profile for Requests for Multiple Resources Working Draft 03, 3 August 2004 Document identifier: oasis-xacml-profile-multiple-resources-wd-03
More informationTestCases for the SCA POJO Component Implementation Specification Version 1.1
TestCases for the SCA POJO Component Implementation Specification Version 1.1 Committee Specification Draft 02 / Public Review Draft 02 15 August 2011 Specification URIs This version: http://docs.oasis-open.org/opencsa/sca-j/sca-j-pojo-ci-1.1-testcases-csprd02.pdf
More informationMulti-Vendor Key Management with KMIP
Multi-Vendor Key Management with KMIP Tim Hudson CTO & Technical Director tjh@cryptsoft.com 1 Abstract Practical experience from implementing KMIP and from deploying and interoperability testing multiple
More informationIdentity in the Cloud PaaS Profile Version 1.0
Identity in the Cloud PaaS Profile Version 1.0 Committee Note Draft 02 / Public Review Draft 02 16 September 2013 Work Product URIs This is a Non-Standards Track Work Product. The patent provisions of
More informationXACML v3.0 XML Digital Signature Profile Version 1.0
XACML v3.0 XML Digital Signature Profile Version 1.0 Committee Specification 01 10 August 2010 Specification URIs: This Version: http://docs.oasis-open.org/xacml/3.0/xacml-3.0-dsig-v1-spec-cs-01-en.html
More informationUsing SRP for TLS Authentication
Using SRP for TLS Authentication Internet Draft Transport Layer Security Working Group D. Taylor Forge Research Pty Ltd Expires: March 5, 2003 September 4, 2002 Using SRP for TLS Authentication draft-ietf-tls-srp-03
More informationJ. Basney, NCSA Category: Experimental October 10, MyProxy Protocol
GWD-E J. Basney, NCSA Category: Experimental October 10, 2005 MyProxy Protocol Status of This Memo This memo provides information to the Grid community. Distribution is unlimited. Copyright Notice Copyright
More informationAsynchronous Processing Abstract Profile of the OASIS Digital Signature Services Version 1.0
Asynchronous Processing Abstract Profile of the OASIS Digital Signature Services Version 1.0 OASIS Standard 11 April 2007 Specification URIs: This Version: http://docs.oasis-open.org/dss/v1.0/oasis-dss-profiles-asynchronous_processing-spec-v1.0-
More informationPPS (Production Planning and Scheduling) Part 3: Profile Specifications, Version 1.0
PPS (Production Planning and Scheduling) Part 3: Profile Specifications, Version 1.0 Committee Specification 01 Revision 01 21 Sep 2009 Specification URIs: http://docs.oasis-open.org/pps/v1.0/pps-profile-specifications-1.0-cs01-r01.doc
More informationSCA JMS Binding Specification v1.1 Test Assertions Version 1.0
SCA JMS Binding Specification v1.1 Test Assertions Version 1.0 Committee Specification Draft 01 8 November 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-bindings/sca-jmsbinding-1.1-test-assertions-1.0-
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO 21720 First edition 2017-11 XLIFF (XML Localisation interchange file format) XLIFF (Format de fichier XML pour l'échange de données de localisation) Reference number ISO 21720:2017(E)
More informationTOSCA Test Assertions Version 1.0
TOSCA Test Assertions Version 1.0 Committee Note Draft 01 08 December 2016 Specification URIs This version: http://docs.oasis-open.org/tosca/tosca-test-assertions/v1.0/cnd01/tosca-test- Assertions-v1.0-cnd01.pdf
More informationIdentity in the Cloud Outsourcing Profile Version 1.0
Identity in the Cloud Outsourcing Profile Version 1.0 Committee Note 01 05 August 2013 Specification URIs This version: http://docs.oasis-open.org/id-cloud/idcloudoutsourcing/v1.0/cn01/idcloud-outsourcing-v1.0-cn01.doc
More informationCategory: Standards Track September MIB Textual Conventions for Uniform Resource Identifiers (URIs)
Network Working Group D. McWalter, Ed. Request for Comments: 5017 Data Connection Ltd Category: Standards Track September 2007 MIB Textual Conventions for Uniform Resource Identifiers (URIs) Status of
More informationNetwork Working Group Request for Comments: Category: Standards Track April 2001
Network Working Group Request for Comments: 3097 Updates: 2747 Category: Standards Track R. Braden ISI L. Zhang UCLA April 2001 Status of this Memo RSVP Cryptographic Authentication -- Updated Message
More informationKerberos SAML Profiles
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Kerberos SAML Profiles Working Draft 03, 10 th February 2004 Document identifier: draft-sstc-solution-profile-kerberos-03
More informationNetwork Working Group. February 2005
Network Working Group Request for Comments: 4014 Category: Standards Track R. Droms J. Schnizlein Cisco Systems February 2005 Status of This Memo Remote Authentication Dial-In User Service (RADIUS) Attributes
More informationsaml requesting attributes v1.1 wd01 Working Draft January 2016 Standards Track Draft Copyright OASIS Open All Rights Reserved.
Standards Track Draft Copyright OASIS Open 2015. All Rights Reserved. Page 1 of 10 SAML v2.0 Protocol Extension for Requesting Attributes in AuthnRequest Version 1.1 Working Draft 02 19 January 2016 Technical
More informationNetwork Working Group. Category: Standards Track <draft-aboba-radius-iana-03.txt> 30 March 2003 Updates: RFC IANA Considerations for RADIUS
Network Working Group INTERNET-DRAFT Category: Standards Track 30 March 2003 Updates: RFC 2865 B. Aboba Microsoft IANA Considerations for RADIUS This document is an Internet-Draft
More informationCategory: Standards Track March Extensible Provisioning Protocol (EPP) Transport Over TCP
Network Working Group S. Hollenbeck Request for Comments: 3734 VeriSign, Inc. Category: Standards Track March 2004 Extensible Provisioning Protocol (EPP) Transport Over TCP Status of this Memo This document
More informationTest Assertions for the SCA_J Common Annotations and APIs Version 1.1 Specification
Test Assertions for the SCA_J Common Annotations and APIs Version 1.1 Specification Working Draft 6 27 June 2009 Specification URIs: This Version: http://docs.oasis-open.org/sca-assembly/sca-j-caa-1.1-test-assertions-wd5.html
More informationTestCases for the SCA_J Common Annotations and APIs Version 1.1 Specification
TestCases for the SCA_J Common Annotations and APIs Version 1.1 Specification Committee Draft 01 - rev21 21 OctoberNovember 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-j/sca-j-caa-1.1-testcases-cd01.html
More informationUpdates: 2710 September 2003 Category: Standards Track. Source Address Selection for the Multicast Listener Discovery (MLD) Protocol
Network Working Group B. Haberman Request for Comments: 3590 Caspian Networks Updates: 2710 September 2003 Category: Standards Track Status of this Memo Source Address Selection for the Multicast Listener
More informationFebruary T11 Network Address Authority (NAA) Naming Format for iscsi Node Names
Network Working Group Request for Comments: 3980 Updates: 3720 Category: Standards Track M. Krueger M. Chadalapaka R. Elliott Hewlett-Packard Corp. February 2005 Status of this Memo T11 Network Address
More informationMetadata for SAML 1.0 Web Browser Profiles
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 Metadata for SAML 1.0 Web Browser Profiles Working Draft 00, 12 November 2002 Document identifier: draft-sstc-saml-meta-data-00 Location:
More informationDITA 1.2 Whitepaper: Tools and DITA-Awareness
An OASIS DITA Adoption Technical Committee Publication DITA 1.2 Whitepaper: Tools and DITA-Awareness Su-Laine Yeo On behalf of the OASIS DITA Adoption Technical Committee Date: 14 October 2010 OASIS (Organization
More informationTestCases for the SCA Web Service Binding Specification Version 1.1
TestCases for the SCA Web Service Binding Specification Version 1.1 Committee Specification Draft 01 revision 1 + Issue 152 1 April 2011 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-bindings/sca-wsbinding-1.1-testcases-csd01-rev1.html
More informationISO/IEC JTC 1/SC 40/WG 1
ISO/IEC JTC 1/SC 40/WG 1 N 33 ISO/IEC JTC 1/SC 40/WG 1 Governance of InformationTechnology Convenorship: BSI (United Kingdom) Document type: Title: Status: Liaison Organization Contribution Mapping OASIS
More informationTestCases for the SCA Web Service Binding Specification Version 1.1
TestCases for the SCA Web Service Binding Specification Version 1.1 Committee Specification Draft 02 / Public Review Draft 02 14 July 2011 Specification URIs: This version: http://docs.oasis-open.org/opencsa/sca-bindings/sca-wsbinding-1.1-testcases-csprd02.pdf
More informationNetwork Working Group Request for Comments: 3397 Category: Standards Track Apple Computer, Inc. November 2002
Network Working Group Request for Comments: 3397 Category: Standards Track B. Aboba Microsoft S. Cheshire Apple Computer, Inc. November 2002 Dynamic Host Configuration Protocol (DHCP) Domain Search Option
More informationOASIS - Artifact Naming Guidelines
OASIS - Artifact Naming Guidelines Working Draft 08, 4 October 2004 Artifact identifier: tab-artifact_naming_guidelines-1.0-spec-wd-06 Location: http://www.oasis-open.org/apps/org/workgroup/tab/documents.php
More informationTAXII Version Part 5: Default Query
TAXII Version 1.1.1. Part 5: Default Query Committee Specification 01 05 May 2016 Specification URIs This version: http://docs.oasis-open.org/cti/taxii/v1.1.1/cs01/part5-query/taxii-v1.1.1-cs01-part5-query.docx
More informationUpdates: 2409 May 2005 Category: Standards Track. Algorithms for Internet Key Exchange version 1 (IKEv1)
Network Working Group P. Hoffman Request for Comments: 4109 VPN Consortium Updates: 2409 May 2005 Category: Standards Track Algorithms for Internet Key Exchange version 1 (IKEv1) Status of This Memo This
More informationNetwork Working Group. November Encoding Long Options in the Dynamic Host Configuration Protocol (DHCPv4)
Network Working Group Request for Comments: 3396 Updates: 2131 Category: Standards Track T. Lemon Nominum, Inc. S. Cheshire Apple Computer, Inc. November 2002 Status of this Memo Encoding Long Options
More informationCategory: Standards Track October 2006
Network Working Group Request for Comments: 4681 Updates: 4346 Category: Standards Track S. Santesson A. Medvinsky J. Ball Microsoft October 2006 TLS User Mapping Extension Status of This Memo This document
More informationCloud Application Management for Platforms (CAMP) Test Assertions Version 1.1
Cloud Application Management for Platforms (CAMP) Test Assertions Version 1.1 Committee Specification 01 09 November 2014 Specification URIs This version: http://docs.oasis-open.org/camp/camp-ta/v1.1/cs01/camp-ta-v1.1-cs01.pdf
More informationRequest for Comments: 3934 Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice
Network Working Group M. Wasserman Request for Comments: 3934 ThingMagic Updates: 2418 October 2004 BCP: 94 Category: Best Current Practice Updates to RFC 2418 Regarding the Management of IETF Mailing
More informationCategory: Standards Track October Vendor-Identifying Vendor Options for Dynamic Host Configuration Protocol version 4 (DHCPv4)
Network Working Group J. Littlefield Request for Comments: 3925 Cisco Systems, Inc. Category: Standards Track October 2004 Vendor-Identifying Vendor Options for Dynamic Host Configuration Protocol version
More informationCategory: Standards Track October 2006
Network Working Group C. Perkins Request for Comments: 4636 Nokia Research Center Category: Standards Track October 2006 Status of This Memo Foreign Agent Error Extension for Mobile IPv4 This document
More informationMetadata for SAML 1.0 Web Browser Profiles
1 2 3 4 Metadata for SAML 1.0 Web Browser Profiles Working Draft 01, 1 February 2003 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Document identifier: draft-sstc-saml-meta-data-01
More informationTest Assertions Part 1 - Test Assertions Model Version 1.0
Test Assertions Part 1 - Test Assertions Model Version 1.0 Draft 1.0.3 20 January 2010 Specification URIs: This Version: Previous Version: [N/A] Latest Version: http://docs.oasis-open.org/tag/model/v1.0/testassertionsmodel-1.0.html
More informationXACML 3.0 Export Compliance-US (EC- US) Profile Version 1.0
XACML 3.0 Export Compliance-US (EC- US) Profile Version 1.0 Committee Draft 03 17 June 2010 Specification URIs: This Version: http://docs.oasis-open.org/xacml/3.0/xacml-3.0-ec-us-v1-spec-cd-03-en.html
More informationTest Assertions for the SCA Policy Framework 1.1 Specification
Test Assertions for the SCA Policy Framework 1.1 Specification Committee Draft 02 28 September 2010 Specification URIs: This Version: http://docs.oasis-open.org/opencsa/sca-policy/sca-policy-1.1-test-assertions-cd02.html
More informationNetwork Working Group Request for Comments: 4869 Category: Informational May Suite B Cryptographic Suites for IPsec. Status of This Memo
Network Working Group Request for Comments: 4869 Category: Informational L. Law J. Solinas NSA May 2007 Status of This Memo Suite B Cryptographic Suites for IPsec This memo provides information for the
More informationSOA-EERP Business Service Level Agreement Version 1.0
SOA-EERP Business Service Level Agreement Version 1.0 Working Draft 08 10 May 2010 Specification URIs: This Version: http://docs.oasis-open.org/soa-eerp/sla/v1.0/soa-eerp-bsla-spec-wd08.html http://docs.oasis-open.org/soa-eerp/sla/v1.0/soa-eerp-bsla-spec-wd08.doc
More informationOSLC Change Management Version 3.0. Part 2: Vocabulary
OSLC Change Management Version 3.0. Part 2: Vocabulary Committee Specification 01 08 June 2018 Specification URIs This version: http://docs.oasis-open.org/oslc-domains/cm/v3.0/cs01/part2-change-mgt-vocab/.html
More information{Describe the status and stability of the specification here.}
{Document Title} Working Draft 02, {date} Document identifier: wd-spectools-docbook-template-02 Location: http://www.oasis-open.org/spectools/docs Editor: {Jane} {Doe}, {Example Corporation}
More informationCategory: Standards Track May Transport Layer Security Protocol Compression Methods
Network Working Group S. Hollenbeck Request for Comments: 3749 VeriSign, Inc. Category: Standards Track May 2004 Transport Layer Security Protocol Compression Methods Status of this Memo This document
More informationNetwork Working Group Request for Comments: 4162 Category: Standards Track KISA August 2005
Network Working Group Request for Comments: 4162 Category: Standards Track H.J. Lee J.H. Yoon J.I. Lee KISA August 2005 Addition of SEED Cipher Suites to Transport Layer Security (TLS) Status of This Memo
More informationRequest for Comments: 4680 Updates: 4346 September 2006 Category: Standards Track
Network Working Group S. Santesson Request for Comments: 4680 Microsoft Updates: 4346 September 2006 Category: Standards Track Status of This Memo TLS Handshake Message for Supplemental Data This document
More informationPPS (Production Planning and Scheduling) Part 1: Core Elements, Version 1.0
PPS (Production Planning and Scheduling) Part 1: Core Elements, Version 1.0 Committee Specification 01 Revision 01 21 Sep 2009 Specification URIs: http://docs.oasis-open.org/pps/v1.0/pps-core-elements-1.0-cs01-r01.doc
More informationEnabler Release Definition for Smartcard-Web-Server
Enabler Release Definition for Smartcard-Web-Server Candidate Version 1.0 09 Feb 2007 Open Mobile Alliance OMA-ERELD-Smartcard_Web_Server-V1_0-20070209-C OMA-ERELD-Smartcard_Web_Server-V1_0-20070209-C
More informationSearch Web Services - searchretrieve Operation: Abstract Protocol Definition Version 1.0
Search Web Services - searchretrieve Operation: Abstract Protocol Definition Version 1.0 Committee Draft 01 30 June 2008 Specification URIs: This Version: http://docs.oasis-open.org/search-ws/june08releases/apd-v1.0-cd-01.doc
More informationECMA-405. Data Interchange on Parallel Write/Read Disk Format for 5 Optical Disks. 1 st Edition / December Reference number ECMA-123:2009
ECMA-405 1 st Edition / December 2013 Data Interchange on Parallel Write/Read Disk Format for 5 Optical Disks Reference number ECMA-123:2009 Ecma International 2009 COPYRIGHT PROTECTED DOCUMENT Ecma International
More informationExpires: 20 May December 2000 Obsoletes: 1779, 2253
INTERNET-DRAFT Editor: Kurt D. Zeilenga Intended Category: Standard Track OpenLDAP Foundation Expires: 20 May 2001 20 December 2000 Obsoletes: 1779, 2253 Lightweight Directory Access Protocol (v3): UTF-8
More informationRequest for Comments: 3548 July 2003 Category: Informational
Network Working Group S. Josefsson, Ed. Request for Comments: 3548 July 2003 Category: Informational Status of this Memo The Base16, Base32, and Base64 Data Encodings This memo provides information for
More informationNetwork Working Group. Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000
Network Working Group R. Droms INTERNET-DRAFT Bucknell University Obsoletes: draft-ietf-dhc-new-opt-msg-00.txt June 2000 Expires December 2000 Procedure for Defining New DHCP Options and Message Types
More informationJ2ME Code-Signing Profile of the OASIS Digital Signature Services
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 J2ME Code-Signing Profile of the OASIS Digital Signature Services Committee Specification 13 February
More informationRequest for Comments: 4633 Category: Experimental August 2006
Network Working Group S. Hartman Request for Comments: 4633 MIT Category: Experimental August 2006 Status of This Memo Experiment in Long-Term Suspensions From Internet Engineering Task Force (IETF) Mailing
More informationNetwork Working Group Request for Comments: Cisco Systems, Inc. December 2005
Network Working Group Request for Comments: 4243 Category: Standards Track M. Stapp R. Johnson T. Palaniappan December 2005 Vendor-Specific Information Suboption for the Dynamic Host Configuration Protocol
More informationCategory: Standards Track August 2002
Network Working Group G. Parsons Request for Comments: 3362 Nortel Networks Category: Standards Track August 2002 Status of this Memo Real-time Facsimile (T.38) - image/t38 MIME Sub-type Registration This
More information