<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.barnes-mimi-identity-arch" target="https://datatracker.ietf.org/doc/html/draft-barnes-mimi-identity-arch-02">
   <front>
      <title>Identity for E2E-Secure Communications</title>
      <author initials="R." surname="Barnes" fullname="Richard Barnes">
         <organization>Cisco</organization>
      </author>
      <author initials="R." surname="Mahy" fullname="Rohan Mahy">
         <organization>Rohan Mahy Consulting Service</organization>
      </author>
      <date month="February" day="4" year="2025" />
      <abstract>
	 <t>   End-to-end (E2E) security is a critical property for modern user
   communications systems.  E2E security protects users&#x27; communications
   from tampering or inspection by intermediaries that are involved in
   delivering those communcations from one logical endpoint to another.
   In addition to the much-discussed E2E encryption systems, true E2E
   security requires an identity mechanism that prevents the
   communications provider from impersonating participants in a session,
   as a way to gain access to the session.  This document describes a
   high-level architecture for E2E identity, identifying the critical
   mechanisms that need to be specified.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-barnes-mimi-identity-arch-02" />
   
</reference>
