| < draft-iab-privacy-considerations-08.txt | draft-iab-privacy-considerations-09.txt > | |||
|---|---|---|---|---|
| Network Working Group A. Cooper | Network Working Group A. Cooper | |||
| Internet-Draft CDT | Internet-Draft CDT | |||
| Intended status: Informational H. Tschofenig | Intended status: Informational H. Tschofenig | |||
| Expires: October 24, 2013 Nokia Siemens Networks | Expires: November 23, 2013 Nokia Siemens Networks | |||
| B. Aboba | B. Aboba | |||
| Microsoft Corporation | Microsoft Corporation | |||
| J. Peterson | J. Peterson | |||
| NeuStar, Inc. | NeuStar, Inc. | |||
| J. Morris | J. Morris | |||
| M. Hansen | M. Hansen | |||
| ULD Kiel | ULD Kiel | |||
| R. Smith | R. Smith | |||
| Janet | Janet | |||
| April 22, 2013 | May 22, 2013 | |||
| Privacy Considerations for Internet Protocols | Privacy Considerations for Internet Protocols | |||
| draft-iab-privacy-considerations-08.txt | draft-iab-privacy-considerations-09.txt | |||
| Abstract | Abstract | |||
| This document offers guidance for developing privacy considerations | This document offers guidance for developing privacy considerations | |||
| for inclusion in protocol specifications. It aims to make designers, | for inclusion in protocol specifications. It aims to make designers, | |||
| implementers, and users of Internet protocols aware of privacy- | implementers, and users of Internet protocols aware of privacy- | |||
| related design choices. It suggests that whether any individual RFC | related design choices. It suggests that whether any individual RFC | |||
| warrants a specific privacy considerations section will depend on the | warrants a specific privacy considerations section will depend on the | |||
| document's content. | document's content. | |||
| skipping to change at page 1, line 45 ¶ | skipping to change at page 1, line 45 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on October 24, 2013. | This Internet-Draft will expire on November 23, 2013. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2013 IETF Trust and the persons identified as the | Copyright (c) 2013 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| skipping to change at page 5, line 47 ¶ | skipping to change at page 5, line 47 ¶ | |||
| expected and foreseen at design time. | expected and foreseen at design time. | |||
| 3. Terminology | 3. Terminology | |||
| This section defines basic terms used in this document, with | This section defines basic terms used in this document, with | |||
| references to pre-existing definitions as appropriate. As in | references to pre-existing definitions as appropriate. As in | |||
| [RFC4949], each entry is preceded by a dollar sign ($) and a space | [RFC4949], each entry is preceded by a dollar sign ($) and a space | |||
| for automated searching. Note that this document does not try to | for automated searching. Note that this document does not try to | |||
| attempt to define the term 'privacy' with a brief definition. | attempt to define the term 'privacy' with a brief definition. | |||
| Instead, privacy is the sum of what is contained in this document. | Instead, privacy is the sum of what is contained in this document. | |||
| We therefore follow the approach taken by [RFC3552]. | We therefore follow the approach taken by [RFC3552]. Examples of | |||
| several different brief definitions are provided in [RFC4949]. | ||||
| 3.1. Entities | 3.1. Entities | |||
| Several of these terms are further elaborated in Section 4. | Several of these terms are further elaborated in Section 4. | |||
| $ Attacker: An entity that works against one or more privacy | $ Attacker: An entity that works against one or more privacy | |||
| protection goals. Unlike observers, attackers' behavior is | protection goals. Unlike observers, attackers' behavior is | |||
| unauthorized. | unauthorized. | |||
| $ Eavesdropper: A type of attacker that passively observes an | $ Eavesdropper: A type of attacker that passively observes an | |||
| End of changes. 5 change blocks. | ||||
| 5 lines changed or deleted | 6 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||