[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: RE: Example document related to location, threats, and security
All -
During the Infrastructure SC teleconference, I mentioned the work of the
IETF WRT security best practices and location. The following link is to an
excellent threat analysis document just posted to the IETF ECRIT Working Group.
ECRIT is defining a suite of standards and best practices related to Emergency Context Resolution with Internet Technologies (http://www.ietf.org/html.charters/ecrit-charter.html).
Cheers
Carl Reed, PhD
CTO and Executive Director Specification Program OGC The OGC: Helping the World to Communicate Geographically
---------------------
This communication, including attachments, is for the exclusive use of
addressee and may contain proprietary, confidential or privileged information.
If you are not the intended recipient, any use, copying, disclosure,
dissemination or distribution is strictly prohibited. If you are not the
intended recipient, please notify the sender immediately by return email
and delete this communication and destroy all copies.
"The important thing is not to stop questioning." -- Albert Einstein
"Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." -- Helen Keller |
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]