- From: Jon Radoff <jradoff@novalink.com>
- Date: Fri, 16 May 1997 13:58:10 -0400
- To: Fisher Mark <FisherM@exch1.indy.tce.com>
- CC: "'Hallam-Baker Phillip M.'" <hallam@ai.mit.edu>, "'gjw@wnetc.com'" <gjw@wnetc.com>, "'w3c-dist-auth@w3.org'" <w3c-dist-auth@w3.org>
Fisher Mark wrote: > > 1) Authentication -- are you who you say you are? > 2) Access Control -- are you allowed to perform this operation in this > way? > 3) Auditing -- just what was it that you did? > 4) Encryption -- Is your data protected from prying eyes? > I would agree that 3 and 4 are out of scope. Defining #1 is also out of scope, because there are many others working on that components. Our role here should be to determine which #1 we are going to support. The purpose of the Access Control document will be concerned principally with #2.
Received on Friday, 16 May 1997 13:54:18 UTC