Hi Alan,
Thanks - I stand corrected.
Cheers,
- Ira
> Thanks Ira,
>
> One minor note, instead of deleting accounting it now
> says Accounting Attributes (instead of metrics)
> and it just says:
> The PSI shall support accounting metrics and attributes as
> defined in a named version of the PWG Semantic model.
>
> Alan
>
>
> -----Original Message-----
> From: owner-ps@pwg.org [mailto:owner-ps@pwg.org]On Behalf Of Ira
> McDonald
> Sent: Tuesday, October 21, 2003 10:53 AM
> To: ps@pwg.org
> Subject: PS> PSI Reqs revised Security/Discovery sections
>
>
> Hi folks, Tuesday (21 October
> 2003)
>
> Below are complete rewrite replacements for the former sections:
>
> - 5.4 Security
> - 6.1 Print Service Discovery Requirements
>
> Note that at our face-to-face review two weeks ago, we decided to
> DELETE
> entirely the former sections:
>
> - 5.5 Accounting Metrics - to be DELETED
> - 6 Other Considerations - to be DELETED
>
> Thus, the two replacement sections now are:
>
> - 5.4 Security
> - 5.5 Discovery
>
> Cheers,
> - Ira McDonald
> High North Inc
>
> ------------------------------------------------------------------------
>
>
> 5.4 Security
>
> The PSI shall select one or more existing standard end-to-end security
> protocols. The selected PSI security protocol(s) shall be specified as
> optional to use for all PSI implementations, but mandatory to support for
> all PSI implementations. The selected PSI security protocol(s) shall
> support:
>
> (1) Client Authentication - protection from PSI service access by any
> unauthenticated client system or process.
>
> (2) Server Authentication - protection from PSI service offering by any
> unauthenticated server system or process.
>
> (3) Data Integrity - protection from PSI message insertion, message
> deletion, or message modification by any intermediate system.
>
> (4) Data Privacy - protection from PSI message content disclosure to
> any intermediate system.
>
> The PSI shall NOT specify or encourage the use of any hop-by-hop (link or
> network layer) security protocols, because they do not offer any
> end-to-end (application, session, or transport layer) security.
>
>
> 5.5 Discovery
>
> The PSI should select and recommend one or more existing standard
> discovery protocols. The selected PSI disovery protocol(s) should
> support:
>
> (1) Service advertising
>
> (2) Service type discovery
>
> (3) Service capabilities discovery
>
> (4) Device advertising
>
> (5) Device type discovery
>
> (6) Device capabilities discovery
>
> Ira McDonald (Musician / Network Software Architect)
> Blue Roof Music / High North Inc
> PO Box 221
> Grand Marais, MI 49839
> Phone: +1-906-494-2434
> Email: imcdonald@sharplabs.com
This archive was generated by hypermail 2b29 : Wed Oct 22 2003 - 18:08:27 EDT