On 1/16/2014 8:38 AM, Joseph Lorenzo Hall wrote:
I like how the recent Barnes et al. draft refers to this as "object
encryption." best, joe


Indeed, channel vs. object protection is long-standing terminology for the distinction.

Separately, note that "end-to-end" can refer to different end-points. The gateway to an end-users administrative network is a reasonable example of an end, for some considerations.

Equally, a mailbox isn't necessary and end-point, when talking about applications that interact via email, since the application might have additional transit, beyond email. (That's not hypothetical. Electronic Data Interchange [EDI] demonstrated this point.)

d/
--
Dave Crocker
Brandenburg InternetWorking
bbiw.net
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to