On 2/8/12 4:28 PM, "ext Paul Lambert" <[email protected]> wrote:

>[Paul]
>You missed my point below.  There are many sources of threats.  Not all
>can be directly mitigated by protocol mechanisms, but there may be ways
>with associated policies, procedures and agreements to limit the impact.
>
>If we are performing a threat analysis we should look at the full suite
>of threats.

The list in the current threat models text that I proposed is by no means
exhaustiveĊ  Or intended to be. The intent is to derive a key set of
security requirements for the protocol. The focus is on those threats that
are relevant to the device-2-database protocol rather than to the much
more expansive topic of white space technology.

-Raj
 

_______________________________________________
paws mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/paws

Reply via email to