Dear Antony, 

Thanks again for your hard work to put this DMM requirements draft 
together. 

Per my promise to you to suggest the definitions for the trusted and 
untrusted network access, here is my proposal: 

>>>>>
For a trusted network access, the communication between the MN and the 
network is trusted to secure. For an untrusted network access, the 
communication between the MN and the network is not trusted to be secure.

For a trusted network access, all communication between the network 
administrative domains is transferred over pre-established secure links. 
For an untrusted network access, a secured tunnel (e.g. IPSec) needs to be 
established on a per access basis, if required, to secure communication 
between the MN and the access network.
>>>>>

Please feel free to comment and modify.  Cheers.
Tricci 

--------------------------------------------------------
ZTE Information Security Notice: The information contained in this mail (and 
any attachment transmitted herewith) is privileged and confidential and is 
intended for the exclusive use of the addressee(s).  If you are not an intended 
recipient, any disclosure, reproduction, distribution or other dissemination or 
use of the information contained is strictly prohibited.  If you have received 
this mail in error, please delete it and notify us immediately.

_______________________________________________
dmm mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/dmm

Reply via email to