Threat Analysis of the GEOPRIV Protocol
draft-danley-geopriv-threat-analysis-00

Document Type Expired Internet-Draft (geopriv WG)
Last updated 2005-05-26 (latest revision 2002-10-31)
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
pdf htmlized (tools) htmlized bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired (IESG: Dead)
Consensus Boilerplate Unknown
Telechat date
Responsible AD Ted Hardie
Send notices to <mankin@psg.com>, <rg+ietf@qualcomm.com>, <anewton@ecotroph.net>

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-danley-geopriv-threat-analysis-00.txt

Abstract

This document provides some analysis of threats against the GEOPRIV protocol architecture. It focuses on protocol threats, threats that result from the storage of data by entities in the architecture, and threats posed by the abuse of informaion yielded by geopriv. Some security properties that meet these threats are enumerated as a reference for GEOPRIV requirements.

Authors

Deirdre Mulligan (dmulligan@law.berkeley.edu)
Jon Peterson (jon.peterson@neustar.biz)
Michelle Danley (mre213@nyu.edu)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)