ISSUE-38: Use cases and threat model for security requirements

securityUseCases

Use cases and threat model for security requirements

State:
CLOSED
Product:
Policy Framework Requirements
Raised by:
Frederick Hirsch
Opened on:
2009-11-02
Description:
Related Actions Items:
Related emails:
  1. Draft minutes 2010-04-07 (from frederick.hirsch@nokia.com on 2010-04-07)
  2. Agenda - Distributed Meeting 2010-04-07 (from frederick.hirsch@nokia.com on 2010-04-06)
  3. revised minutes 2009-11-02 DAP F2F day 1 (from frederick.hirsch@nokia.com on 2009-11-03)
  4. draft minutes 2009-11-02 F2f Day1 (from frederick.hirsch@nokia.com on 2009-11-03)

Related notes:

No additional notes.

Display change log ATOM feed


Anssi Kostiainen <anssi.kostiainen@intel.com>, Reilly Grant <reillyg@google.com>, Chairs, Fuqiao Xue <xfq@w3.org>, Staff Contact
Tracker: documentation, (configuration for this group), originally developed by Dean Jackson, is developed and maintained by the Systems Team <w3t-sys@w3.org>.
$Id: 38.html,v 1.1 2019/11/08 08:58:40 carcone Exp $