Hi Roman, Linda, and Yoav,
To complement our I2NSF as a closed-loop security control,
the following three individual drafts are important:

- Security Management Automation of Cloud-Based Security Services in I2NSF
Framework
https://datatracker.ietf.org/doc/draft-jeong-i2nsf-security-management-automation/

- I2NSF Analytics Interface YANG Data Model
https://datatracker.ietf.org/doc/draft-lingga-i2nsf-analytics-interface-dm/

- Guidelines for Security Policy Translation in Interface to Network
Security Functions
https://datatracker.ietf.org/doc/draft-yang-i2nsf-security-policy-translation/

We have proved the concept of this closed-loop security control of the
I2NSF system
through the IETF hackathon projects.

Could I submit them as independent submissions to the IETF
with the sponsor of Roman or somebody else?
https://www.rfc-editor.org/about/independent/

I CC the co-authors of these drafts along with I2NSF WG.

Thanks.

Best Regards,
Paul
-- 
===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Associate Professor
Department of Computer Science and Engineering
Sungkyunkwan University
Office: +82-31-299-4957
Email: paulje...@skku.edu, jaehoon.p...@gmail.com
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php
<http://cpslab.skku.edu/people-jaehoon-jeong.php>
_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to