Many thanks to Michael for his comments.they have been reflected in the
text. Any more comments, suggestions additions or deletions? I would like
to send this to Jim by tomorrow afternoon.
From: Michael Sweet [mailto:msweet at apple.com]
Sent: Tuesday, February 08, 2011 5:46 PM
To: William Wagner
Cc: wims at pwg.org; ids at pwg.org; mfd at pwg.org
Subject: Re: [WIMS] MPSA Security Article
On Feb 6, 2011, at 12:56 AM, William Wagner wrote:
An updated version reflecting comments made during the February face-to-face
is posted at :
This includes a short biblio and a set of survey questions.
Comments and corrections are solicited. It is our objective to finalize this
information and send it to MPSA by 10 February so that it can be posted
Comments (on the PDF version):
Page 3: At the end of the first paragraph under "Log Generation and
Availability", you have "... is often required for security purposes, (audit
log), sometimes with alerts ..." - I don't think you meant to put commas
around the parenthetical "audit log"...
Page 3: Paragraph starting with "Although the most secure approach" doesn't
finish the thought. I think combining the first two sentences makes it
Although the most secure approach is for devices to continually send out log
information to an external repository as events occur, this is often neither
practical nor justifiable.
Page 7: Question 6 is multiple choice, right?
Page 8: Question 7 could also be multiple choice for a, b, or c... My
recommendation would be to break this into two questions: "If you are
implementing logging, where is it kept?" and "How to you implement billing?"
with "Logs", "Simple copy count", "other", and "not implementing billing".
Otherwise shaping up very nicely - thanks for working on this, Bill!
Michael Sweet, Senior Printing System Engineer, PWG Chair
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.
-------------- next part --------------
An HTML attachment was scrubbed...