 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
n |
Took out all the
security requirements
|
|
|
|
q |
System security
requirements
|
|
|
|
q |
Client security
requirements
|
|
|
n |
The existing
document is a P2PSIP security
|
|
|
overview and risk
analysis document
|
|
|
n |
Security
requirements were discussed on the
|
|
|
mailing list and
may cause a change to the
|
|
|
|
security
consideration section in the base
|
|
|
draft.
|
|