Skip to main content

Effect of Ubiquitous Encryption
draft-mm-wg-effect-encrypt-03

The information below is for an old version of the document.
Document Type Expired Internet-Draft (individual)
Authors Kathleen Moriarty , Al Morton
Last updated 2016-04-21 (Latest revision 2015-10-19)
Stream Internet Engineering Task Force (IETF)
Formats
Expired & archived
plain text xml htmlized pdfized bibtex
Reviews
Stream WG state (None)
Document shepherd (None)
IESG IESG state Expired
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD (None)
Send notices to (None)
This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-mm-wg-effect-encrypt-03.txt

Abstract

Increased use of encryption will impact operations for security and network management causing a shift in how these functions are performed. In some cases, new methods to both monitor and protect data will evolve. In more drastic circumstances, the ability to monitor may be eliminated. This draft includes a collection of current security and network management functions that may be impacted by the shift to increased use of encryption. This draft does not attempt to solve these problems, but rather document the current state to assist in the development of alternate options to achieve the intended purpose of the documented practices.

Authors

Kathleen Moriarty
Al Morton

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)