That sounds better to me. Let's go with that.

On Fri, Jul 15, 2011 at 1:44 PM, Krishnamurthy, Hema - ES
<[email protected]> wrote:
> Maybe just say " add module events for symmetric and asymmetric key fill"
>
> 'Key Fill' is a common terminology.
>
>
> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On Behalf Of Kevin 
> W. Wall
> Sent: Friday, July 15, 2011 10:42 AM
> To: CICM Discussion List
> Subject: Re: [cicm] Key Fill (was: Proposed WG Charter)
>
> Lev,
>
> You mean like an HSM, as an example of a key filled device?
>
> Seems like it should say something like "Key filled device" or
> "key filled interface" or "key filled action" or "key filled protocol" or
> _something_ then. The way it's worded is a bit odd as far as the
> English grammar goes.
>
> To me, that bullet reads as though some word is missing at the
> end. Even with your explanation (which now makes it makes it sense)
> it still reads very awkward to me.
>
> -kevin
>
> On Fri, Jul 15, 2011 at 9:51 AM, Novikov, Lev <[email protected]> wrote:
>> On 2011-07-15 08:14, Kevin Wall wrote:
>>>...[snip]...
>>>>
>>>>  * add module events for symmetric and asymmetric key filled
>>>
>>>               ^^^^^
>>>
>>>Is that supposed to be 'key field' ??? Because I don't get
>>>"key filled".
>>
>> From: http://tools.ietf.org/html/draft-lanz-cicm-lm-00
>>
>>   $ key fill device
>>
>>      Devices that read-in, transfer, and store key material.
>>
>>   $ key fill interface
>>
>>      Set of protocols, electrical connections, and physical
>>      characteristics that comprise the connecting link between a key
>>      fill device and a cryptographic module.  CICM enables a key fill
>>      interface to be configured and actions to be initiated on a key
>>      fill device via the key fill interface.
>>
>> See Also:
>> http://tools.ietf.org/html/draft-lanz-cicm-km-00 (search for "key fill")
>>
>> Lev
>> _______________________________________________
>> cicm mailing list
>> [email protected]
>> https://www.ietf.org/mailman/listinfo/cicm
>>
>
>
>
> --
> Blog: http://off-the-wall-security.blogspot.com/
> "The most likely way for the world to be destroyed, most experts agree,
> is by accident. That's where we come in; we're computer professionals.
> We *cause* accidents."        -- Nathaniel Borenstein
> _______________________________________________
> cicm mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/cicm
>
> This e-mail and any files transmitted with it may be proprietary and are 
> intended solely for the use of the individual or entity to whom they are 
> addressed. If you have received this e-mail in error please notify the sender.
> Please note that any views or opinions presented in this e-mail are solely 
> those of the author and do not necessarily represent those of ITT 
> Corporation. The recipient should check this e-mail and any attachments for 
> the presence of viruses. ITT accepts no liability for any damage caused by 
> any virus transmitted by this e-mail.
> _______________________________________________
> cicm mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/cicm
>



-- 
Blog: http://off-the-wall-security.blogspot.com/
"The most likely way for the world to be destroyed, most experts agree,
is by accident. That's where we come in; we're computer professionals.
We *cause* accidents."        -- Nathaniel Borenstein
_______________________________________________
cicm mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cicm

Reply via email to