< draft-iab-privacy-considerations-08.txt   draft-iab-privacy-considerations-09.txt >
Network Working Group A. Cooper Network Working Group A. Cooper
Internet-Draft CDT Internet-Draft CDT
Intended status: Informational H. Tschofenig Intended status: Informational H. Tschofenig
Expires: October 24, 2013 Nokia Siemens Networks Expires: November 23, 2013 Nokia Siemens Networks
B. Aboba B. Aboba
Microsoft Corporation Microsoft Corporation
J. Peterson J. Peterson
NeuStar, Inc. NeuStar, Inc.
J. Morris J. Morris
M. Hansen M. Hansen
ULD Kiel ULD Kiel
R. Smith R. Smith
Janet Janet
April 22, 2013 May 22, 2013
Privacy Considerations for Internet Protocols Privacy Considerations for Internet Protocols
draft-iab-privacy-considerations-08.txt draft-iab-privacy-considerations-09.txt
Abstract Abstract
This document offers guidance for developing privacy considerations This document offers guidance for developing privacy considerations
for inclusion in protocol specifications. It aims to make designers, for inclusion in protocol specifications. It aims to make designers,
implementers, and users of Internet protocols aware of privacy- implementers, and users of Internet protocols aware of privacy-
related design choices. It suggests that whether any individual RFC related design choices. It suggests that whether any individual RFC
warrants a specific privacy considerations section will depend on the warrants a specific privacy considerations section will depend on the
document's content. document's content.
skipping to change at page 1, line 45 skipping to change at page 1, line 45
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on October 24, 2013. This Internet-Draft will expire on November 23, 2013.
Copyright Notice Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
skipping to change at page 5, line 47 skipping to change at page 5, line 47
expected and foreseen at design time. expected and foreseen at design time.
3. Terminology 3. Terminology
This section defines basic terms used in this document, with This section defines basic terms used in this document, with
references to pre-existing definitions as appropriate. As in references to pre-existing definitions as appropriate. As in
[RFC4949], each entry is preceded by a dollar sign ($) and a space [RFC4949], each entry is preceded by a dollar sign ($) and a space
for automated searching. Note that this document does not try to for automated searching. Note that this document does not try to
attempt to define the term 'privacy' with a brief definition. attempt to define the term 'privacy' with a brief definition.
Instead, privacy is the sum of what is contained in this document. Instead, privacy is the sum of what is contained in this document.
We therefore follow the approach taken by [RFC3552]. We therefore follow the approach taken by [RFC3552]. Examples of
several different brief definitions are provided in [RFC4949].
3.1. Entities 3.1. Entities
Several of these terms are further elaborated in Section 4. Several of these terms are further elaborated in Section 4.
$ Attacker: An entity that works against one or more privacy $ Attacker: An entity that works against one or more privacy
protection goals. Unlike observers, attackers' behavior is protection goals. Unlike observers, attackers' behavior is
unauthorized. unauthorized.
$ Eavesdropper: A type of attacker that passively observes an $ Eavesdropper: A type of attacker that passively observes an
 End of changes. 5 change blocks. 
5 lines changed or deleted 6 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/