Good. This is not unlike the NIST SP800-53r4 approach which is the foundational U.S. (and probably CCRA) network security approach.
--tony On 10/31/2013 2:18 PM, Scott Brim wrote:
You left out: what is possible in the protocol system provided to the implementors. There are issues with protocols, new and old, that are being looked at right now in order to improve the _possibility_ of privacy. This is something the IETF can be very good at: creating/guiding the scope over which the three rather generalized "factors" you mention can range.
_______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
