[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Security-Requirements: alternatives?
Haitham, I-D Authors, List,
One of the issues we need to be clear about in preparing for a WG
adoption of the security requirements I-D is the possible alternatives
that have been proposed/implemented in other standards organisations.
Could you summarise the methods that have been proposed for MPEG-2
transmission networks that provide equivalent L2 security functions, and
say which to your knowledge has actually have been implemented in systems?
Thanks,
Gorry