RL 'Bob' Morgan wrote:
>
> I think many of the requirements (no, haven't made a list yet) have the
> assumption of "when appropriate", or "when desired", where "desired" is
> some combination of what the user wants and what the application wants
> or will permit.

Indeed, many of these are distinct "security properties". Note in the intro to his note, ekr termed the content of his note as:

  "a taxonomy of requirements/features and technical options"


JeffH





_______________________________________________
dix mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/dix

Reply via email to