Policy Terminology
Robert Shirey <shirey@smiley.mitre.org> Thu, 18 October 1990 19:35 UTC
Received: from mwunix.mitre.org by NRI.NRI.Reston.VA.US id aa10233; 18 Oct 90 15:35 EDT
Return-Path: <shirey@smiley.mitre.org>
Received: from smiley.mitre.org by mwunix.mitre.org (5.61/SMI-2.2) id AA06212; Thu, 18 Oct 90 15:33:38 -0400
Received: by smiley.mitre.org (4.1/SMI-4.0) id AA15757; Thu, 18 Oct 90 15:33:36 EDT
Date: Thu, 18 Oct 1990 15:33:36 -0400
From: Robert Shirey <shirey@smiley.mitre.org>
Message-Id: <9010181933.AA15757@smiley.mitre.org>
To: spwg@NRI.Reston.VA.US
Subject: Policy Terminology
Status: O
At a minimum, Internet security policy and other security-related documents shoul use the internationally standardized terminology of ISO International Standard 7498/2, the OSI security architecture. For example, say "data confidentiality" instead of "data privacy". There is enough work to do without having to define terms. The draft policy reads much more like a voluntary code of ethics than a policy. Definition from 7498/2: "security policy: The set of criteria for the provision of security services".
- Policy Terminology Robert Shirey
- Re: Policy Terminology Martin Lee Schoffstall