That sounds better to me. Let's go with that. On Fri, Jul 15, 2011 at 1:44 PM, Krishnamurthy, Hema - ES <[email protected]> wrote: > Maybe just say " add module events for symmetric and asymmetric key fill" > > 'Key Fill' is a common terminology. > > > -----Original Message----- > From: [email protected] [mailto:[email protected]] On Behalf Of Kevin > W. Wall > Sent: Friday, July 15, 2011 10:42 AM > To: CICM Discussion List > Subject: Re: [cicm] Key Fill (was: Proposed WG Charter) > > Lev, > > You mean like an HSM, as an example of a key filled device? > > Seems like it should say something like "Key filled device" or > "key filled interface" or "key filled action" or "key filled protocol" or > _something_ then. The way it's worded is a bit odd as far as the > English grammar goes. > > To me, that bullet reads as though some word is missing at the > end. Even with your explanation (which now makes it makes it sense) > it still reads very awkward to me. > > -kevin > > On Fri, Jul 15, 2011 at 9:51 AM, Novikov, Lev <[email protected]> wrote: >> On 2011-07-15 08:14, Kevin Wall wrote: >>>...[snip]... >>>> >>>> * add module events for symmetric and asymmetric key filled >>> >>> ^^^^^ >>> >>>Is that supposed to be 'key field' ??? Because I don't get >>>"key filled". >> >> From: http://tools.ietf.org/html/draft-lanz-cicm-lm-00 >> >> $ key fill device >> >> Devices that read-in, transfer, and store key material. >> >> $ key fill interface >> >> Set of protocols, electrical connections, and physical >> characteristics that comprise the connecting link between a key >> fill device and a cryptographic module. CICM enables a key fill >> interface to be configured and actions to be initiated on a key >> fill device via the key fill interface. >> >> See Also: >> http://tools.ietf.org/html/draft-lanz-cicm-km-00 (search for "key fill") >> >> Lev >> _______________________________________________ >> cicm mailing list >> [email protected] >> https://www.ietf.org/mailman/listinfo/cicm >> > > > > -- > Blog: http://off-the-wall-security.blogspot.com/ > "The most likely way for the world to be destroyed, most experts agree, > is by accident. That's where we come in; we're computer professionals. > We *cause* accidents." -- Nathaniel Borenstein > _______________________________________________ > cicm mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/cicm > > This e-mail and any files transmitted with it may be proprietary and are > intended solely for the use of the individual or entity to whom they are > addressed. If you have received this e-mail in error please notify the sender. > Please note that any views or opinions presented in this e-mail are solely > those of the author and do not necessarily represent those of ITT > Corporation. The recipient should check this e-mail and any attachments for > the presence of viruses. ITT accepts no liability for any damage caused by > any virus transmitted by this e-mail. > _______________________________________________ > cicm mailing list > [email protected] > https://www.ietf.org/mailman/listinfo/cicm >
-- Blog: http://off-the-wall-security.blogspot.com/ "The most likely way for the world to be destroyed, most experts agree, is by accident. That's where we come in; we're computer professionals. We *cause* accidents." -- Nathaniel Borenstein _______________________________________________ cicm mailing list [email protected] https://www.ietf.org/mailman/listinfo/cicm
