[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: RE: Example document related to location, threats, and security
During the Infrastructure SC teleconference, I mentioned the work of the IETF WRT security best practices and location. The following link is to an excellent threat analysis document just posted to the IETF ECRIT Working Group. ECRIT is defining a suite of standards and best practices related to Emergency Context Resolution with Internet Technologies (http://www.ietf.org/html.charters/ecrit-charter.html).
Carl Reed, PhD
CTO and Executive Director Specification Program
The OGC: Helping the World to Communicate Geographically
This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender immediately by return email and delete this communication and destroy all copies.
"The important thing is not to stop questioning." -- Albert Einstein
"Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." -- Helen Keller