[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Re: [cti-stix] Use cases....
Jerome: Thanks for the PDF. Another interesting find. "By applying insights from computing to policy designs using the computational policy technique, we can leverage greater knowledge to obtain better outcomes and more scalable policy solutions to the pressing, growing, “large-n” problems of modern life, including but not limited to cybersecurity." It is a stretch from the Algorithms section of that paper to flushing out Use Cases (as Christian suggests)...but, I get the link you are making. Agreed. We need to do this as a foundational part of Sean's Roadmap. Jane On 12/4/2015 9:06 PM, Jerome Athias wrote: > Greetings, > > I get your point. > I would recommend to look at the Algorithms in the attached document > to understand what Christian is (I think :)) asking for. > I strongly suggest to use this method. > (But, of course, both Christian and me would have to participate... ;-)) > > Best regards > > > > 2015-12-04 4:28 GMT+03:00 Christian Hunt <cvoid@newcontext.com>: >> >> --------------------------------------------------------------------- >> To unsubscribe from this mail list, you must leave the OASIS TC that >> generates this mail. Follow this link to all your TCs in OASIS at: >> https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php >> >> >> >> >> --------------------------------------------------------------------- >> To unsubscribe from this mail list, you must leave the OASIS TC that >> generates this mail. Follow this link to all your TCs in OASIS at: >> https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php -- Jane Ginn, MSIA, MRP Cyber Threat Intelligence Network, Inc. jg@ctin.us |
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]