On 2/8/12 4:28 PM, "ext Paul Lambert" <[email protected]> wrote:
>[Paul] >You missed my point below. There are many sources of threats. Not all >can be directly mitigated by protocol mechanisms, but there may be ways >with associated policies, procedures and agreements to limit the impact. > >If we are performing a threat analysis we should look at the full suite >of threats. The list in the current threat models text that I proposed is by no means exhaustiveĊ Or intended to be. The intent is to derive a key set of security requirements for the protocol. The focus is on those threats that are relevant to the device-2-database protocol rather than to the much more expansive topic of white space technology. -Raj _______________________________________________ paws mailing list [email protected] https://www.ietf.org/mailman/listinfo/paws
