Considerations
11. IANA Considerations
12. References
12.1. Normative References
12.2. Informative References
Appendix A. ASN.1 Modules
A.1. ASN.1 Modules with 1988 Syntax
...
The indirect addressing includes one or more references to an
external hashed data structure that cont
l
17.10. The "message/mls" Media Type
18. References
18.1. Normative References
18.2. Informative References
Appendix A. Protocol Origins of Example Trees
Appendix B. Evolutio...
A member of the group MAY send a Commit that references no proposals
at all, which would thus have an
Assignments
6. Security Considerations
7. References
7.1. Normative References
7.2. Informative References
Appendix A. Templates
A.1. EUI-48/EUI-64 Identifier or Identifier... egistry.
As this document replaces [RFC7042], references to [RFC7042] in IANA
registries in both the "I
2713)
2714 Schema for Representing CORBA Object References in an LDAP
Directory. V. Ryan, R. Lee, S. Se... (DOI: 10.17487/RFC3295)
3296 Named Subordinate References in Lightweight Directory Access
Protocol (LD... DARD) (DOI:
10.17487/RFC3840)
3841 Caller Preferences for the Session Initiation Protocol (SIP). J.
... L) (DOI: 10.17487/RFC4190)
4191 Default Router Preferences and More-Specific Routes. R. Draves, D.
Thal
. Seligman, "Schema for Representing CORBA Object References in an LDAP Directory", RFC 2714, DOI 10.17487/RFC... 96 | | Zeilenga, K., "Named Subordinate References in Lightweight Directory Access Protocol (LDAP) D... rg, J., Schulzrinne, H., and P. Kyzivat, "Caller Preferences for the Session Initiation Protocol (SIP)", RFC 3... | Draves, R. and D. Thaler, "Default Router Preferences and More-Specific Routes", RFC 4191, DOI 10.17487
rs Registry
6. Security Considerations
7. References
7.1. Normative References
7.2. Informative References
Appendix A. Examples
A.1. Examples of Signed Messages
A.1.... s used during the writing of this document.
It references those non-terminals that are used for security
ontents
14.4. Other Registry Updates
15. References
15.1. Normative References
15.2. Informative References
Appendix A. Decoding Text in Zone Files
A.1. Decoding a Comma-Se... ection briefly describes the SVCB RR with forward references
to the full exposition of each component. (As
Considerations
13. IANA Considerations
14. References
14.1. Normative References
14.2. Informative References
Appendix A. Definitions Updated by This Document
Appendix B. Defin... DNS or private DNS.
13. IANA Considerations
References to RFC 8499 in the IANA registries have been repl
es Registry
5. Security Considerations
6. References
6.1. Normative References
6.2. Informative References
Appendix A. Examples
A.1. Example XML Configuration
A.2. Ex... ging the IP-TFS extensions.
The model contains references to [RFC9347] and [RFC5348].
<CODE BEGINS> fil
siderations
13. Security Considerations
14. References
14.1. Normative References
14.2. Informative References
Appendix A. Paradigms to Enforce Access Control on Reverse Search
... ted to jCard elements [RFC7095], but
the field references are to vCard [RFC6350], since jCard is the JSON