PS> PSI Reqs revised Security/Discovery sections

PS> PSI Reqs revised Security/Discovery sections

imcdonald at sharplabs.com imcdonald at sharplabs.com
Wed Oct 22 18:08:31 EDT 2003


Hi Alan,

Thanks - I stand corrected.

Cheers,
- Ira

> Thanks Ira,
> 
> One minor note, instead of deleting accounting it now
> says Accounting Attributes (instead of metrics)
> and it just says:
> The PSI shall support accounting metrics and attributes as 
> defined in a named version of the PWG Semantic model. 
> 
> Alan
> 
> 
> -----Original Message-----
> From: owner-ps at pwg.org [mailto:owner-ps at pwg.org]On Behalf Of Ira
> McDonald
> Sent: Tuesday, October 21, 2003 10:53 AM
> To: ps at pwg.org
> Subject: PS> PSI Reqs revised Security/Discovery sections
> 
> 
> Hi folks,                                     Tuesday (21 October 
> 2003)
> 
> Below are complete rewrite replacements for the former sections:
> 
> - 5.4 Security
> - 6.1 Print Service Discovery Requirements
> 
> Note that at our face-to-face review two weeks ago, we decided to 
> DELETE
> entirely the former sections:
> 
> - 5.5 Accounting Metrics - to be DELETED
> - 6 Other Considerations - to be DELETED
> 
> Thus, the two replacement sections now are:
> 
> - 5.4 Security
> - 5.5 Discovery
> 
> Cheers,
> - Ira McDonald
>   High North Inc
> 
> ------------------------------------------------------------------------
> 
> 
> 5.4 Security
> 
> The PSI shall select one or more existing standard end-to-end security
> protocols.  The selected PSI security protocol(s) shall be specified as
> optional to use for all PSI implementations, but mandatory to support for
> all PSI implementations.  The selected PSI security protocol(s) shall
> support:
> 
> (1) Client Authentication - protection from PSI service access by any
>     unauthenticated client system or process.
> 
> (2) Server Authentication - protection from PSI service offering by any
>     unauthenticated server system or process.
> 
> (3) Data Integrity - protection from PSI message insertion, message
>     deletion, or message modification by any intermediate system.
> 
> (4) Data Privacy - protection from PSI message content disclosure to
>     any intermediate system.
> 
> The PSI shall NOT specify or encourage the use of any hop-by-hop (link or
> network layer) security protocols, because they do not offer any
> end-to-end (application, session, or transport layer) security.
> 
> 
> 5.5 Discovery
> 
> The PSI should select and recommend one or more existing standard
> discovery protocols.  The selected PSI disovery protocol(s) should
> support:
> 
> (1) Service advertising
> 
> (2) Service type discovery
> 
> (3) Service capabilities discovery
> 
> (4) Device advertising
> 
> (5) Device type discovery
> 
> (6) Device capabilities discovery
> 
>   Ira McDonald (Musician / Network Software Architect) 
>   Blue Roof Music / High North Inc
>   PO Box 221
>   Grand Marais, MI  49839
>   Phone: +1-906-494-2434
>   Email: imcdonald at sharplabs.com





More information about the Ps mailing list