RL 'Bob' Morgan wrote: > > I think many of the requirements (no, haven't made a list yet) have the > assumption of "when appropriate", or "when desired", where "desired" is > some combination of what the user wants and what the application wants > or will permit.
Indeed, many of these are distinct "security properties". Note in the intro to his note, ekr termed the content of his note as:
"a taxonomy of requirements/features and technical options" JeffH _______________________________________________ dix mailing list [email protected] https://www1.ietf.org/mailman/listinfo/dix
