{"id":"https://openalex.org/W1725776467","doi":"https://doi.org/10.17487/rfc5570","title":"Common Architecture Label IPv6 Security Option (CALIPSO)","display_name":"Common Architecture Label IPv6 Security Option (CALIPSO)","publication_year":2009,"publication_date":"2009-07-01","ids":{"openalex":"https://openalex.org/W1725776467","doi":"https://doi.org/10.17487/rfc5570","mag":"1725776467"},"language":"en","primary_location":{"id":"doi:10.17487/rfc5570","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc5570","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051584023","display_name":"Michael StJohns","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"M. StJohns","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110327156","display_name":"R. Atkinson","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"R. Atkinson","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5000005233","display_name":"Ga\u00ebl Thomas","orcid":"https://orcid.org/0000-0002-9444-1071"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"G. Thomas","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5051584023"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9628000259399414,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9628000259399414,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.5534418821334839},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.5347138047218323},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4658191204071045},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41601794958114624},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33236056566238403},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.18758311867713928},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17799344658851624},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.09738215804100037},{"id":"https://openalex.org/keywords/archaeology","display_name":"Archaeology","score":0.06891757249832153}],"concepts":[{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.5534418821334839},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.5347138047218323},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4658191204071045},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41601794958114624},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33236056566238403},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.18758311867713928},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17799344658851624},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.09738215804100037},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.06891757249832153}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.17487/rfc5570","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc5570","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.182.5908","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.5908","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://info.internet.isi.edu/in-notes/pdfrfc/rfc5570.txt.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.374.5543","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.374.5543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://ietfreport.isoc.org/rfc/std/PDF/rfc-pdf/rfc5570.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.697.7887","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.697.7887","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.hakusan.tsg.ne.jp/%7Etjkawa/www.ietf.org/rfc/pdf/rfc5570.txt.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2130966263","https://openalex.org/W2801831215","https://openalex.org/W2380425999","https://openalex.org/W2373379668","https://openalex.org/W2361536150","https://openalex.org/W2794347061","https://openalex.org/W2145399247","https://openalex.org/W2046674671","https://openalex.org/W3159674053","https://openalex.org/W2079954852"],"abstract_inverted_index":{"This":[0,35,37,63,162],"document":[1,157,163,188],"describes":[2],"an":[3,49,69,107],"optional":[4],"method":[5],"for":[6,18,41,110,135],"encoding":[7],"explicit":[8],"packet":[9],"Sensitivity":[10],"Labels":[11],"on":[12,139,181],"IPv6":[13,70],"packets.":[14],"It":[15,45,132],"is":[16,59,92,106,125,133,164],"intended":[17],"use":[19,67,116,136],"only":[20,126],"within":[21],"Multi-Level":[22],"Secure":[23],"(MLS)":[24],"networking":[25],"environments":[26],"that":[27,76,102],"are":[28,84],"both":[29],"trusted":[30],"and":[31,86,115,137,151,169],"trustworthy.":[32],"Status":[33],"of":[34,52,56,68,79,89,184,186],"Memo":[36],"memo":[38,58],"provides":[39],"information":[40],"the":[42,66,87,98,119,140,152,156,170,182],"Internet":[43,50],"community.":[44],"does":[46],"not":[47],"specify":[48],"standard":[51],"any":[53],"kind.":[54],"Distribution":[55],"this":[57,111,123,187],"unlimited.":[60],"IESG":[61,74],"Note":[62],"RFC":[64,124],"specifies":[65],"hop-by-hop":[71,82,104],"option.":[72],"The":[73],"notes":[75],"general":[77],"deployment":[78],"protocols":[80,91],"with":[81],"options":[83],"problematic,":[85],"development":[88],"such":[90],"consequently":[93],"discouraged.":[94],"After":[95],"careful":[96],"review,":[97],"IETF":[99,149,171,177],"has":[100],"determined":[101],"a":[103],"option":[105],"appropriate":[108],"solution":[109],"specific":[112],"limited":[113],"environment":[114],"case.":[117],"Furthermore,":[118],"mechanism":[120],"specified":[121],"in":[122,179],"applicable":[127],"to":[128,166,176],"closed":[129],"IP":[130],"networks.":[131],"unsuitable":[134],"ineffective":[138],"global":[141],"public":[142],"Internet.":[143],"Copyright":[144,146],"Notice":[145],"(c)":[147],"2009":[148],"Trust":[150],"persons":[153],"identified":[154],"as":[155],"authors.":[158],"All":[159],"rights":[160],"reserved.":[161],"subject":[165],"BCP":[167],"78":[168],"Trust\u2019s":[172],"Legal":[173],"Provisions":[174],"Relating":[175],"Documents":[178],"effect":[180],"date":[183],"publication":[185]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
