- From: Joseph M. Reagle Jr. <reagle@w3.org>
- Date: Fri, 27 Oct 2000 16:52:15 -0400
- To: Steve Wiley <steve@myProof.com>
- Cc: xml-encryption@w3.org
At 15:36 10/22/2000 -0700, Steve Wiley wrote: >Attached is a short paper regarding our experiences with XML encryption. Thanks for the well thought out requirements. Two questions: >http://lists.w3.org/Archives/Public/xml-encryption/2000Oct/att-0011/01-myproof-xml-encryption-position.html#Nested >Encryption >It is possible that a user may want to apply selective or full encryption >to a target document that has already had some selective encryption applied Is this requirement is in opposition to your detached document requirement which asks that the original tags not be altered. So basically, one should have the option not to change the original tag structure? >http://lists.w3.org/Archives/Public/xml-encryption/2000Oct/att-0011/01-myproof-xml-encryption-position.html#Mutiple >Encryptions What exactly do you mean by an encryption/decryption protocol [1]? I expect we'll define a 1) syntax for representing decrypted information and the (optional?) information that can be used to decrypt it 2) process for encrypting data into the representation syntax, and a process for decrypting it, but no "protocol" in my understanding [1,2] ...? http://www.landfield.com/rfcs/rfc2828.html $ protocol (I) A set of rules (i.e., formats and procedures) to implement and control some type of association (e.g., communication) between systems. (E.g., see: Internet Protocol.) (C) In particular, a series of ordered steps involving computing and communication that are performed by two or more system entities to achieve a joint objective. [A9042] __ Joseph Reagle Jr. W3C Policy Analyst mailto:reagle@w3.org IETF/W3C XML-Signature Co-Chair http://www.w3.org/People/Reagle/
Received on Friday, 27 October 2000 16:52:21 UTC