
|
Framework - Protocol Design Issues Reuse -- independent vs. reuse of security for another purpose Layering -- interaction with a lower layer vs. independent Using a branch of EAP AMSK vs. rerunning EAP Separation of SA establishment and use -- but what about authorization? Type of an SA? Likely “application” specific But ability to use MIPv6 BAD would often be useful Efficiency -- look at the # messages and timing of the whole flow |