ISSUE-37: Domain spoofing and trust in the network layer
domainSpoofing
Domain spoofing and trust in the network layer
- State:
- CLOSED
- Product:
- Policy Framework Requirements
- Raised by:
- David Rogers
- Opened on:
- 2009-11-02
- Description:
- Related Actions Items:
ACTION-38 on Claes Nilsson to Should issue recommendation on the granularity of the security system - due 2009-12-16, closed- Related emails:
- RE: Action updates needed - ACTION-231 (Web Introducer prototyping) (from Claes1.Nilsson@sonyericsson.com on 2011-01-24)
- RE: Action updates needed - ACTION-231 (from Claes1.Nilsson@sonyericsson.com on 2011-01-10)
- RE: Action updates needed (from Laura.Arribas@vodafone.com on 2011-01-05)
- Action updates needed (from Frederick.Hirsch@nokia.com on 2011-01-04)
- Draft minutes 2010-05-12 (from frederick.hirsch@nokia.com on 2010-05-12)
- Draft minutes 2010-04-07 (from frederick.hirsch@nokia.com on 2010-04-07)
- Agenda - Distributed Meeting 2010-04-07 (from frederick.hirsch@nokia.com on 2010-04-06)
- Draft Minutes 2010-03-10 (from frederick.hirsch@nokia.com on 2010-03-10)
- regrets (from marco.marengo@telecomitalia.it on 2010-03-09)
- Agenda - Distributed Meeting 2010-03-10 (from frederick.hirsch@nokia.com on 2010-03-08)
- revised minutes 2009-11-02 DAP F2F day 1 (from frederick.hirsch@nokia.com on 2009-11-03)
- draft minutes 2009-11-02 F2f Day1 (from frederick.hirsch@nokia.com on 2009-11-03)
Related notes:
No additional notes.
Display change log