Definition of the ROLIE Vulnerability Extension
draft-ietf-mile-rolie-vuln-03
Document | Type | Expired Internet-Draft (mile WG) | |
---|---|---|---|
Author | Stephen Banghart | ||
Last updated | 2020-04-30 (latest revision 2019-10-28) | ||
Replaces | draft-banghart-mile-rolie-vuln | ||
Stream | IETF | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | WG state | WG Document | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | Expired | |
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-ietf-mile-rolie-vuln-03.txt
Abstract
This document extends the Resource-Oriented Lightweight Information Exchange (ROLIE) core to add the information type categories and related requirements needed to support Vulnerability use cases. Additional categories, properties, and requirements based on content type enables a higher level of interoperability between ROLIE implementations, and richer metadata for ROLIE consumers. In particular, usage of the Common Vulnerability Enumeration (CVE) [cve] format is discussed.
Authors
Stephen Banghart (stephen.banghart@nist.gov)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)