Re: Anders' p2 challenge

2008-12-08 Thread Ian G
Anders Rundgren wrote: Hi Guys, Thank you for taking on the p2 challenge! Although the responses were rather different, AFAICT, they all required new security infrastructure Good to remind this slightly obscure requirement :) beyond what is offered by the enterprise (employee) PKI which is

Re: Anders' p2 challenge

2008-12-08 Thread Anders Rundgren
Hi Guys, Thank you for taking on the p2 challenge! Although the responses were rather different, AFAICT, they all required new security infrastructure beyond what is offered by the enterprise (employee) PKI which is (from my perspective) the interesting part since the consultants that for examp

Re: Anders' p2 challenge

2008-12-07 Thread Arshad Noor
Given this example, and using traditional technologies and protocols, this problem appears intractable. However, there is a new solution - becoming an OASIS standard shortly - that not only solves this problem, but goes beyond this stage of the problem to address the next stage of the problem. E

Anders' p2 challenge

2008-12-05 Thread Ian G
Anders wrote: > When any of you guys have made a *public* write-up on how you > would address the [related] issues mentioned on p.2 in this document > http://webpki.org/papers/web/A.R.AppliedPKI-Lesson-1.pdf > you are ready for the real discussion. 1. How is the purchaser (P) going to select an