Effect of Ubiquitous Encryption
draft-mm-wg-effect-encrypt-03
| Document | Type | Expired Internet-Draft (individual) | |
|---|---|---|---|
| Authors | Kathleen Moriarty , Al Morton | ||
| Last updated | 2016-04-21 (Latest revision 2015-10-19) | ||
| Stream | Internet Engineering Task Force (IETF) | ||
| Formats |
Expired & archived
plain text
xml
htmlized
pdfized
bibtex
|
||
| Reviews |
GENART Telechat review
(of
-15)
Ready with Nits
GENART Last Call review
(of
-13)
Ready with Nits
OPSDIR Last Call review
(of
-13)
Has Nits
GENART Telechat review
(of
-10)
Ready with Nits
SECDIR Telechat review
(of
-09)
Has Nits
|
||
| Stream | WG state | (None) | |
| Document shepherd | (None) | ||
| IESG | IESG state | Expired | |
| Consensus boilerplate | Unknown | ||
| Telechat date | (None) | ||
| Responsible AD | (None) | ||
| Send notices to | (None) |
https://www.ietf.org/archive/id/draft-mm-wg-effect-encrypt-03.txt
Abstract
Increased use of encryption will impact operations for security and network management causing a shift in how these functions are performed. In some cases, new methods to both monitor and protect data will evolve. In more drastic circumstances, the ability to monitor may be eliminated. This draft includes a collection of current security and network management functions that may be impacted by the shift to increased use of encryption. This draft does not attempt to solve these problems, but rather document the current state to assist in the development of alternate options to achieve the intended purpose of the documented practices.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)