<
From: "Colin Wallis"
To: dg-am@kantarainitiative.org Sent: Tuesday, February 21, 2012 8:57:43 PM Subject: Re: [DG-AM] v1.1 of the draft report Hi again..
On Friday 10th I [g]ave you this snippet...
Ooops, that's right. Sorry I missed that!
<
> So that is 3 efforts now..4 actually, because you can do it with digital certificates in a PKI And I gave you the front channel, back channel and 'point to point' VPN text..
We can say that front channel offers more security challenges, but has greater reach because mobile devices are capable of managing it.
Our guest next week might help us with your questions as this is 'his bag' :-).
As far as I know, no new protocols are proposed, so the 'gaps' as such are limited to profiling the existing protocols for use as attribute carriers. If there is a gap at all, I would say it around the (untested?) security of the new protocols, and that the current suite of security techniques and the protocols themselves are still too heavyweight for the mobile device market. But we are skating onto the edge of the scope now...
So text along the lines of: The protocol space around attributes is comparatively stable. What is missing, however, is better guidance on how exactly to use those protocols to carry attributes and their associated metadata in a secure and interoperable fashion. In particular, how to use these protocols in the mobile device market, where the large data streams don't work in a mobile profile. Would that work? -Heather _______________________________________________ DG-AM mailing list DG-AM@kantarainitiative.org http://kantarainitiative.org/mailman/listinfo/dg-am ==== CAUTION: This email message and any attachments contain information that may be confidential and may be LEGALLY PRIVILEGED. If you are not the intended recipient, any use, disclosure or copying of this message or attachments is strictly prohibited. If you have received this email message in error please notify us immediately and erase all copies of the message and attachments. Thank you. ====