PS> PSI Reqs revised Security/Discovery sections

PS> PSI Reqs revised Security/Discovery sections

BERKEMA,ALAN C (HP-Roseville,ex1) alan.berkema at hp.com
Wed Oct 22 15:35:30 EDT 2003


Thanks Ira,

One minor note, instead of deleting accounting it now
says Accounting Attributes (instead of metrics)
and it just says:
The PSI shall support accounting metrics and attributes as 
defined in a named version of the PWG Semantic model. 

Alan


-----Original Message-----
From: owner-ps at pwg.org [mailto:owner-ps at pwg.org]On Behalf Of Ira
McDonald
Sent: Tuesday, October 21, 2003 10:53 AM
To: ps at pwg.org
Subject: PS> PSI Reqs revised Security/Discovery sections


Hi folks,                                      Tuesday (21 October 
2003)

Below are complete rewrite replacements for the former sections:

- 5.4 Security
- 6.1 Print Service Discovery Requirements

Note that at our face-to-face review two weeks ago, we decided to 
DELETE
entirely the former sections:

- 5.5 Accounting Metrics - to be DELETED
- 6 Other Considerations - to be DELETED

Thus, the two replacement sections now are:

- 5.4 Security
- 5.5 Discovery

Cheers,
- Ira McDonald
  High North Inc

------------------------------------------------------------------------


5.4 Security

The PSI shall select one or more existing standard end-to-end security
protocols.  The selected PSI security protocol(s) shall be specified as
optional to use for all PSI implementations, but mandatory to support
for all PSI implementations.  The selected PSI security protocol(s)
shall support:

(1) Client Authentication - protection from PSI service access by any
    unauthenticated client system or process.

(2) Server Authentication - protection from PSI service offering by any
    unauthenticated server system or process.

(3) Data Integrity - protection from PSI message insertion, message
    deletion, or message modification by any intermediate system.

(4) Data Privacy - protection from PSI message content disclosure to
    any intermediate system.

The PSI shall NOT specify or encourage the use of any hop-by-hop (link
or network layer) security protocols, because they do not offer any
end-to-end (application, session, or transport layer) security.


5.5 Discovery

The PSI should select and recommend one or more existing standard
discovery protocols.  The selected PSI disovery protocol(s) should
support:

(1) Service advertising

(2) Service type discovery

(3) Service capabilities discovery

(4) Device advertising

(5) Device type discovery

(6) Device capabilities discovery

  Ira McDonald (Musician / Network Software Architect) 
  Blue Roof Music / High North Inc
  PO Box 221
  Grand Marais, MI  49839
  Phone: +1-906-494-2434
  Email: imcdonald at sharplabs.com



More information about the Ps mailing list