rddp-5----Page:3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
Approach
Security analysis not constrained to any one implementation – examine the scope of implementations
The draft is relatively new – minimal review
Still sections left to be written
PPT Version