icos-3----Page:5
1  2  3  4  5  6  7  8 

Process for Analyzing New EAP Applications
System level security analysis required for EAP key management applications
Requirements outlined by Russ Housley at IETF 56
All EAP key management applications need to meet these requirements
EAP methods used in those applications need to meet the requirements as well
EAP Key Management Framework document (work in progress)
Focus is on Scenario 2: defining and analyzing existing usage
EAP Key Management Extensions may handle new applications (Scenario 3)


PPT Version