OASIS Emergency Management TC

 View Only

RE: Example document related to location, threats, and security

  • 1.  RE: Example document related to location, threats, and security

    Posted 08-21-2008 18:27
    
    
    
    
    
    
    
    All -
     
    During the Infrastructure SC teleconference, I mentioned the work of the IETF WRT security best practices and location. The following link is to an excellent threat analysis document just posted to the IETF ECRIT Working Group. ECRIT is defining a suite of standards and best practices related to Emergency Context Resolution with Internet Technologies (http://www.ietf.org/html.charters/ecrit-charter.html).
     
    Cheers
     
    Carl Reed, PhD
    CTO and Executive Director Specification Program
    OGC
     
    The OGC: Helping the World to Communicate Geographically
     
    ---------------------
     
    This communication, including attachments, is for the exclusive use of addressee and may contain proprietary, confidential or privileged information. If you are not the intended recipient, any use, copying, disclosure, dissemination or distribution is strictly prohibited. If you are not the intended recipient, please notify the sender  immediately by return email and delete this communication and destroy all copies.
     
    "The important thing is not to stop questioning." -- Albert Einstein
    "Security is mostly a superstition. It does not exist in nature. Life is either a daring adventure or nothing." -- Helen Keller