On 1/16/2014 8:38 AM, Joseph Lorenzo Hall wrote:
I like how the recent Barnes et al. draft refers to this as "object encryption." best, joe
Indeed, channel vs. object protection is long-standing terminology for the distinction.
Separately, note that "end-to-end" can refer to different end-points. The gateway to an end-users administrative network is a reasonable example of an end, for some considerations.
Equally, a mailbox isn't necessary and end-point, when talking about applications that interact via email, since the application might have additional transit, beyond email. (That's not hypothetical. Electronic Data Interchange [EDI] demonstrated this point.)
d/ -- Dave Crocker Brandenburg InternetWorking bbiw.net _______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
