<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.ietf-rtgwg-yang-key-chain" target="https://datatracker.ietf.org/doc/html/draft-ietf-rtgwg-yang-key-chain-00">
   <front>
      <title>Key Chain YANG Data Model</title>
      <author initials="A." surname="Lindem" fullname="Acee Lindem">
         </author>
      <author initials="Y." surname="Qu" fullname="Yingzhen Qu">
         </author>
      <author initials="D. M." surname="Yeung" fullname="Derek M. Yeung">
         </author>
      <author initials="H." surname="Chen" fullname="Ing-Wher (Helen) Chen">
         </author>
      <author initials="Z. J." surname="Zhang" fullname="Zhaohui (Jeffrey) Zhang">
         </author>
      <author initials="Y." surname="Yang" fullname="Yi Yang">
         </author>
      <date month="December" day="1" year="2015" />
      <abstract>
	 <t>   This document describes the key chain YANG data model.  A key chain
   is a list of elements each containing a key, send lifetime, accept
   lifetime, and algorithm.  By properly overlapping the send and accept
   lifetimes of multiple key chain elements, keys and algorithms may be
   gracefully updated.  By representing them in a YANG data model, key
   distribution can be automated.  Key chains are commonly used for
   routing protocol authentication and other applications.  In some
   applications, the protocols do not use the key chain element key
   directly, but rather a key derivation function is used to derive a
   short-lived key from the key chain element key.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-rtgwg-yang-key-chain-00" />
   
</reference>
