Anders Rundgren wrote:
Hi Guys,
Thank you for taking on the p2 challenge!
Although the responses were rather different, AFAICT, they all required new
security infrastructure
Good to remind this slightly obscure requirement :)
beyond what is offered by the enterprise (employee) PKI which is
Hi Guys,
Thank you for taking on the p2 challenge!
Although the responses were rather different, AFAICT, they all required new
security infrastructure
beyond what is offered by the enterprise (employee) PKI which is (from my
perspective)
the interesting part since the consultants that for examp
Given this example, and using traditional technologies and
protocols, this problem appears intractable. However, there
is a new solution - becoming an OASIS standard shortly - that
not only solves this problem, but goes beyond this stage of
the problem to address the next stage of the problem.
E
Anders wrote:
> When any of you guys have made a *public* write-up on how you
> would address the [related] issues mentioned on p.2 in this document
> http://webpki.org/papers/web/A.R.AppliedPKI-Lesson-1.pdf
> you are ready for the real discussion.
1. How is the purchaser (P) going to select an
4 matches
Mail list logo