W3C home > Mailing lists > Public > public-webcrypto@w3.org > June 2012

Re: Use case classification, and associated security models

From: Wan-Teh Chang <wtc@google.com>
Date: Wed, 13 Jun 2012 19:32:59 -0700
Message-ID: <CALTJjxH=WDr=XaQ2d1sOSqOMxod3WSuVFfKGY1f57BK4i-huyw@mail.gmail.com>
To: Vijay Bharadwaj <Vijay.Bharadwaj@microsoft.com>
Cc: "public-webcrypto@w3.org" <public-webcrypto@w3.org>
On Wed, Jun 13, 2012 at 6:03 PM, Vijay Bharadwaj
<Vijay.Bharadwaj@microsoft.com> wrote:
> True. I was thinking about this from the perspective of what the browser needs
> to do to help with access control of the key. My thinking was that in #2 there
> was no persisted object to control access to. But your formulation works as well.

Ah, I see.  You assume the keys produced by key agreement procedures
are "session" (non-persistent) keys.  Thank you for the clarification

Received on Thursday, 14 June 2012 02:33:28 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 6 January 2015 21:17:10 UTC