DomainKeys Security Tagging (DOSETA)
draft-crocker-doseta-base-03

Document Type Expired Internet-Draft (individual)
Authors Murray Kucherawy  , Dave Crocker 
Last updated 2011-07-11
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-crocker-doseta-base-03.txt

Abstract

DomainKeys Security Tagging (DOSETA) is a component mechanism that enables easy development of security-related services, such as for authentication or encryption. It uses self-certifying keys based on domain names. The domain name owner can be any actor involved in the handling of the data, such as the author's organization, a server operator or one of their agents. The DOSETA Library provides a collection of common capabilities, including canonicalization, parameter tagging and key retrieval. The DOSETA Signing Template creates common framework for a signature of data that are in a "header/content" form. Defining the meaning of a signature is the responsibility of the service that incorporates DOSETA. Data security is enforced through the use of cryptographic algorithms.

Authors

Murray Kucherawy (msk@cloudmark.com)
Dave Crocker (dcrocker@bbiw.net)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)