[Strint-attendees] initial cut at a recommended reading list for STRINT workshop

Karen O'Donoghue <odonoghue@isoc.org> Wed, 12 February 2014 06:09 UTC

Return-Path: <odonoghue@isoc.org>
X-Original-To: strint-attendees@lists.i1b.org
Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2lp0240.outbound.protection.outlook.com [207.46.163.240]) by diego.dreamhost.com (Postfix) with ESMTP id 56B1148005 for <strint-attendees@lists.i1b.org>; Tue, 11 Feb 2014 22:09:53 -0800 (PST)
Received: from kodonog-mac.local (74.214.48.55) by BY2PR06MB581.namprd06.prod.outlook.com (10.141.221.146) with Microsoft SMTP Server (TLS) id 15.0.873.15; Wed, 12 Feb 2014 06:09:51 +0000
Message-ID: <52FB102A.9040701@isoc.org>
Date: Wed, 12 Feb 2014 01:09:46 -0500
From: Karen O'Donoghue <odonoghue@isoc.org>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:24.0) Gecko/20100101 Thunderbird/24.2.0
MIME-Version: 1.0
To: strint-attendees@lists.i1b.org
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Originating-IP: [74.214.48.55]
X-ClientProxiedBy: BLUPR01CA007.prod.exchangelabs.com (10.255.223.165) To BY2PR06MB581.namprd06.prod.outlook.com (10.141.221.146)
X-Forefront-PRVS: 01208B1E18
X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10019001)(6009001)(52044002)(189002)(199002)(76786001)(77096001)(36756003)(76796001)(76176001)(85306002)(83506001)(81342001)(92566001)(85852003)(81542001)(90146001)(93516002)(95416001)(83072002)(33656001)(86362001)(94316002)(94946001)(15975445006)(80316001)(93136001)(56816005)(80976001)(50466002)(92726001)(83322001)(81816001)(74876001)(79102001)(87976001)(74366001)(51856001)(81686001)(64126003)(77982001)(47446002)(74662001)(74502001)(4396001)(49866001)(47736001)(50986001)(47976001)(23756003)(54316002)(66066001)(59766001)(59896001)(19580395003)(80022001)(65806001)(63696002)(47776003)(65956001)(74706001)(56776001)(46102001)(76482001)(31966008)(95666001)(69226001)(42186004)(53806001)(54356001)(564094006); DIR:OUT; SFP:1102; SCL:1; SRVR:BY2PR06MB581; H:kodonog-mac.local; CLIP:74.214.48.55; FPR:F464C9F8.89FB47E1.23EB9C4F.88F86642.20213; InfoNoRecordsMX:1; A:1; LANG:en;
X-OriginatorOrg: isoc.org
Subject: [Strint-attendees] initial cut at a recommended reading list for STRINT workshop
X-BeenThere: strint-attendees@lists.i1b.org
X-Mailman-Version: 2.1.14
Precedence: list
List-Id: STRINT Workshop Discussion List <strint-attendees-i1b.org>
List-Unsubscribe: <http://lists.i1b.org/options.cgi/strint-attendees-i1b.org>, <mailto:strint-attendees-request@lists.i1b.org?subject=unsubscribe>
List-Archive: <http://lists.i1b.org/pipermail/strint-attendees-i1b.org>
List-Post: <mailto:strint-attendees@lists.i1b.org>
List-Help: <mailto:strint-attendees-request@lists.i1b.org?subject=help>
List-Subscribe: <http://lists.i1b.org/listinfo.cgi/strint-attendees-i1b.org>, <mailto:strint-attendees-request@lists.i1b.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Feb 2014 06:09:53 -0000

Folks,

The TPC thought it would be useful to put together a short reading list 
for those
planning to come to the STRINT workshop. This list would be background 
material
  in addition to the published submissions.

Below is an initial cut at this list. Please feel free to provide 
additional recommendations.
In particular, the W3C participants may want to identify an key W3C 
documents
that are relevant. At some point, I expect this list will make it onto 
the agenda
and materials pages for the workshop and possibly into a workshop report.

Regards,
Karen

RECOMMENDED READING LIST
===================
RFC 1984 (IAB and IESG Statement on Cryptographic Technology and the 
Internet)
https://tools.ietf.org/html/rfc1984

RFC 2804 (IETF Policy on Wiretapping)
https://tools.ietf.org/html/rfc2804

RFC 3365 (Strong Security Requirements for Internet Engineering Task 
Force Standard Protocols)
https://tools.ietf.org/html/rfc3365

RFC 3552 (Guidelines for Writing RFC Text on Security Considerations)
https://tools.ietf.org/html/rfc3552

RFC 6973 (Privacy Considerations for Internet Protocols)
https://tools.ietf.org/html/rfc6973

Pervasive Monitoring is an Attack
https://datatracker.ietf.org/doc/draft-farrell-perpass-attack/