Just to double-check: - This draft looks at security from the standpoint of tenants being potentially malicious, but the provider infrastructure is all trusted. - It assumes that the provider-managed equipment is not compromised (e.g. the hypervisor is never compromised).
Is this correct? Anoop On Wed, Jun 20, 2012 at 1:59 AM, <[email protected]> wrote: > > Hi, folks > > A new draft is posted, which is about the security framework for NVO3. > Please review it, any comments are appreciated. > > Filename: draft-wei-nvo3-security-framework > Revision: 00 > Title: NVO3 Security Framework > Creation date: 2012-06-20 > WG ID: Individual Submission > Number of pages: 8 > URL: > http://www.ietf.org/internet-drafts/draft-wei-nvo3-security-framework-00.txt > Status: > http://datatracker.ietf.org/doc/draft-wei-nvo3-security-framework > Htmlized: > http://tools.ietf.org/html/draft-wei-nvo3-security-framework-00 > > > Abstract: > This document provides a security framework for overlay based network > virtualization. It describes the security reference model, the > security threats and security requirements. > > > ------------- > Yinxing Wei > _______________________________________________ > nvo3 mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/nvo3 > _______________________________________________ nvo3 mailing list [email protected] https://www.ietf.org/mailman/listinfo/nvo3
