Regarding security, there was agreement that the security protocol between the 
master and the DB is going to protect the DB resources and not the radio 
spectrum. Ie, we are not going to design a protocol to prevent malicious use of 
the WS spectrum; devices can put energy in the air and cause interference 
without asking the DB.

Since the Use cases and Requirements document is also going to be soon revised, 
I would propose that we capture the scope of the security in there too, and get 
rid of threats 3, 5 and first part of threat 4.

Does anybody have any issues with the above?

In the solution document, security section, we need input to address the rest 
of the threats described in the use case and requirements document. Yang Cui 
volunteered in the f2f to provide some text, hopefully we'll see sg soon. 
Anybody else interested in this topic is also welcome to contribute.


-          Gabor
_______________________________________________
paws mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/paws

Reply via email to