Re: Use case classification, and associated security models

On Wed, Jun 13, 2012 at 6:03 PM, Vijay Bharadwaj
<Vijay.Bharadwaj@microsoft.com> wrote:
> True. I was thinking about this from the perspective of what the browser needs
> to do to help with access control of the key. My thinking was that in #2 there
> was no persisted object to control access to. But your formulation works as well.

Ah, I see.  You assume the keys produced by key agreement procedures
are "session" (non-persistent) keys.  Thank you for the clarification

Wan-Teh

Received on Thursday, 14 June 2012 02:33:28 UTC