Re: [ietf-dkim] Structure of the threat analysis...2005-10-12 12:36:18Stephen: - A collection of MUST/SHOULD etc. constraints imposed on the protocol which is basically the output of the threat analysis (so we've something to check the protocol against later) I believe you are talking about protocol requirements. Does this have to be done in the threat analysis first round prior to charter? Eliot _______________________________________________ ietf-dkim mailing list http://dkim.org
|
|