Table of Contents
Guidelines for Authors of Security Considerations SectionsorHow not to freak out the Security ADs
Background
The General Idea
The Internet threat model
Easier to mount attacks
Security Services
Rules of Thumb
Object vs. channel security
Some inappropriate choices
Perfection not required
Bottom line
Read the draft (in IESG-WAIT)
|
Author: Eric Rescorla
|