Threat Analysis of the GEOPRIV Protocol
draft-danley-geopriv-threat-analysis-00
Document | Type |
Expired Internet-Draft
(geopriv WG)
Expired & archived
|
|
---|---|---|---|
Authors | Deirdre Mulligan , Jon Peterson , Michelle Danley | ||
Last updated | 2005-05-26 (Latest revision 2002-10-31) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | (None) | ||
Formats | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | WG Document | |
Document shepherd | (None) | ||
IESG | IESG state | Expired (IESG: Dead) | |
Action Holders |
(None)
|
||
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | Ted Hardie | ||
Send notices to | <mankin@psg.com>, <rg+ietf@qualcomm.com>, <anewton@ecotroph.net> |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document provides some analysis of threats against the GEOPRIV protocol architecture. It focuses on protocol threats, threats that result from the storage of data by entities in the architecture, and threats posed by the abuse of informaion yielded by geopriv. Some security properties that meet these threats are enumerated as a reference for GEOPRIV requirements.
Authors
Deirdre Mulligan
Jon Peterson
Michelle Danley
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)