2Created by xxx - 25 January 2006 RFC 2434: Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g.,

Slides:



Advertisements
Similar presentations
1 APNIC Resource Certification Service Project Routing SIG 7 Sep 2005 APNIC20, Hanoi, Vietnam George Michaelson.
Advertisements

© 2006 Open Grid Forum Network Services Interface Introduction to NSI Guy Roberts.
© 2006 Open Grid Forum OGF19 Federated Identity Rule-based data management Wed 11:00 AM Mountain Laurel Thurs 11:00 AM Bellflower.
Reliability Center Data Request Task Force Report WECC Board Meeting April 2009.
A Symbology Change Management Process. Why Have Standard Symbology? Cost Effective Everyone uses same symbols No individual effort designing symbols Standard.
News in XACML 3.0 and application to the cloud Erik Rissanen, Axiomatics
DDI3 Uniform Resource Names: Locating and Providing the Related DDI3 Objects Part of Session: DDI 3 Tools: Possibilities for Implementers IASSIST Conference,
Ensuring Better Services and Fair Value “Introduction and roadmap to implementation of ISO in Zambia’s water utilities” Kasenga Hara March 2015.
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
Uniform Resource Names: Deploying A New Namespace Michael Mealling 19 August 1999.
Request Management System Overview & Education November 2012 Russell Quattlebaum ·
Opening Presentation of Notary Reqs 8/5/2004 Tobias Gondrom.
PlanetLab Federation Development Aaron Klingaman Princeton University.
Chapter 4 Chapter 4: Planning the Active Directory and Security.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Pertemuan 16 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Content Framework for the Committee Report Using PowerPoint to prepare a formal committee report John A. Cagle.
Enterprise Directory Services A Common Registry (Identity Management) & Common Source of Authoritative Attributes Presentation to the Office of the President.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 8: Managing and Troubleshooting DNS.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
Release & Deployment ITIL Version 3
OneM2M-MP Data_Model_Repository Establishing Data Model Repository for oneM2M Group Name: Method and Procedure Sub-commitee Source: WG3 chair.
1 APARSEN - WP2200 Identifiers and Citability Interoperability Framework for PI systems Webinar on PI - 15 February 2013 Maurizio Lunghi.
Open Name Services names.oclc.org Keith Shafer Office of Research.
Locating objects identified by DDI3 Uniform Resource Names Part of Session: Concurrent B2: Reports and Updates on DDI activities 2nd Annual European DDI.
Trust Anchor Management Problem Statement 69 th IETF Trust Anchor Management BOF Carl Wallace.
Module 5: Planning a DNS Strategy. Overview Planning DNS Servers Planning a Namespace Planning Zones Planning Zone Replication and Delegation Integrating.
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Industry Canada 1 Bob Leafloor Colman Ho Peter Chau Industry Canada January 2003 (ENUM) T E lephone NU mber M apping.
Shib-Grid Integrated Authorization (Shintau) George Inman (University of Kent) TF-EMC2 Meeting Prague, 5 th September 2007.
Proposal to Clarify Data Submission Reporting and Documentation Requirements (Resolution 22) Membership & Professional Standards Committee (MPSC) Jonathan.
EFCA European Federation of Engineering Consultancy Associations FIDIC 2005 Yann Leblais EFCA President Quality in Procurement Beijing Hotel, Beijing -
IETF – ECRIT Emergency Context Resolution using Internet Technologies ESW 5 – Vienna October 2008 Marc Linsner.
T-MPLS Update (abridged) IETF70 December 2007 Stewart Bryant
Chapter 12: SYSVOL: Old & New BAI617. Chapter Topics What is SysVol? Understanding File Replication System (FRS) Understanding 2008 R2 Distributed.
Mar 3, 2006APNIC 21 Meeting -- Perth, AU1 IANA Status Report David Conrad, ICANN IANA General Manager.
RADIUS issues in IPv6 deployments draft-hu-v6ops-radius-issues-ipv6-01 J. Hu, YL. Ouyang, Q. Wang, J. Qin,
IETF63 - enum WG1 ENUM validation architecture & friends Alex Mayrhofer enum.at / 3.4.e164.arpa Bernie Höneisen SWITCH.
ISO Geographic information Procedures for item registration.
Working with XML Schemas ©NIITeXtensible Markup Language/Lesson 3/Slide 1 of 36 Objectives In this lesson, you will learn to: * Declare attributes in an.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
It was found in 1946 in Geneva, Switzerland. its main purpose is to promote the development of international standards to facilitate the exchange of goods.
The original Internationalized Domain Name (IDN) WG set the requirements for international characters in domain names in RFC 3454, RFC3490, RFC3491 and.
OSPF WG Cryptographic Algorithm Implementation Requirements for OSPF draft-bhatia-manral-crypto-req-ospf-00.txt Vishwas Manral, IPInfusion Manav Bhatia,
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
Requirements in the product life cycle Chapter 7.
Civic Address Extensibility draft-ietf-geopriv-prefix draft-george-geopriv-lamp-post draft-winterbottom-geopriv-local-civic.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
National Standardization Secretariat ITU Regional Standardization Forum for Africa and SG5RG-ARF and SG5RG-AFR Meetings Livingstone, Zambia March.
ENF/ERO ENUM Convergence Workshop Tony Holmes Chairman ETSI SPAN11 NAR BTexact Technologies Numbering Addressing & Routeing 9-10 January 2002 Standards.
Proposed solutions to comments on section 7
IT Service Transition – purpose and processes
MQTT-255 Support alternate authenticaion mechanisms
Trust Anchor Management Problem Statement
IS-IS WG IS-IS Cryptographic Authentication Requirements
Configuring and Troubleshooting Routing and Remote Access
Security Working Group
Competence Pack Guide to Assessment.
Proposed solutions to comments on section 7
Competence Can Do or Have Done!. Competence Can Do or Have Done!
ICANN62 GAC Capacity Building
Guidance notes for Project Manager
Competence Pack Guide to Assessment.
Remedy for beacon bloat
Media Independent Handover
Enterprise Use Cases and A-Level Attestation
Enterprise Use Cases and A-Level Attestation
IETF 87 DHC WG Berlin, Germany Thursday, 1 August, 2013
Presentation transcript:

2Created by xxx - 25 January 2006 RFC 2434: Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication algorithm for IPSec). To insure that such quantities have consistent values and interpretations in different implementations, their assignment must be administered by a central authority.

3Created by xxx - 25 January 2006 RFC The creation of a new registry name will be simple for most flat registries. The only required elements will be the registry name, a reference to relevant documents, a statement about which current/proposed document repositories contains the authoritative data for the registry, and a statement specifying which element in the registry is the value to be used in the URN.

4Created by xxx - 25 January 2006 RFC 3406 Organization Requirements the organization maintaining the URN namespace should demonstrate stability and the ability to maintain the URN namespace for a long time, and/or it should be clear how the namespace can continue to be usable/useful if the organization ceases to be able to foster it; it should demonstrate ability and competency in name assignment. This should improve the likelihood of persistence (e.g. to minimize the likelihood of conflicts); it should commit to not re-assigning existing names and allowing old names to continue to be valid, even if the owners or assignees of those names are no longer members or customers of that organization. This does not mean that there must be resolution of such names, but that they must not resolve the name to false or stale information, and that they must not be reassigned.

5Created by xxx - 25 January 2006 Request includes various boilerplate plus: URN resolution/delegation type of resources to be identified type of services to be supported URN assignment procedures