siesta -- SessIon layEr SecuriTy Approach discussion list. | |
|
|
About siesta | |
The present end-to-end application security context is tightly coupled with the underlying communication context. This is problematic for at least three reasons. First, it is not flexible: when the underlying communication context changes, the application security context must change, too. Second, in certain applications, the overhead associated with such coupling is prohivitively expensive over constrained networks (such as sensor- or cellular networks). Third, and probably most important, an attack on the communication context immediately effects the application security.
To see the collection of prior postings to the list, visit the siesta Archives. |
|
Using siesta | |
To post a message to all the list members, send email to
siesta@ietf.org.
You can subscribe to the list, or change your existing subscription, in the sections below. |
|
Subscribing to siesta | |
Subscribe to siesta by filling out the following form. You will be sent email requesting confirmation, to prevent others from gratuitously subscribing you. This is a private list, which means that the list of members is not available to non-members. | |
siesta Subscribers | |
|
![]() version 2.1.39 |
![]() |
![]() |