Good.  This is not unlike the NIST SP800-53r4 approach
which is the foundational U.S. (and probably CCRA)
network security approach.

--tony

On 10/31/2013 2:18 PM, Scott Brim wrote:
You left out: what is possible in the protocol system provided to the implementors. There are issues with protocols, new and old, that are being looked at right now in order to improve the _possibility_ of privacy. This is something the IETF can be very good at: creating/guiding the scope over which the three rather generalized "factors" you mention can range.

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to