After doing some reading elsewhere, I think it would be reasonable to outline the version of security when the pub/sub agent can be trusted. This makes a contrast with this model that people should understand.
Jim _______________________________________________ Ace mailing list Ace@ietf.org https://www.ietf.org/mailman/listinfo/ace