Published work items: Difference between revisions

From ETI
(Created page with "The ETI Problem Statement Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Maecenas porttitor congue massa. Fusce posuere, magna sed pulvinar ultricies, purus lectus...")
 
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
The ETI Problem Statement
<h1>
[https://www.etsi.org/deliver/etsi_gr/ETI/001_099/001/01.01.01_60/gr_ETI001v010101p.pdf ETI Problem Statement]
</h1>


Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Maecenas porttitor congue massa. Fusce posuere, magna sed pulvinar ultricies, purus lectus malesuada libero, sit amet commodo magna eros quis urna.
The problem statement (linked to above) is where ETI starts from. The purpose of the document is to consider the impact of pervasive encryption on stakeholders, and to assist future standards development activity in mitigating the negative impact on stakeholders whilst not adversely impacting the positive impacts of such a paradigm on stakeholders, including the regulatory and lawful dimensions.
Nunc viverra imperdiet enim. Fusce est. Vivamus a tellus.
The document is structured as follows (starting from the main body which always starts at clause 4 in ETSI publications):
Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis egestas. Proin pharetra nonummy pede. Mauris et orci.
 
Aenean nec lorem. In porttitor. Donec laoreet nonummy augue.
• Clause 4 outlines the role of encryption as it is being applied to networks from a mainly business perspective.
Suspendisse dui purus, scelerisque at, vulputate vitae, pretium mattis, nunc. Mauris eget neque at sem venenatis eleifend. Ut nonummy.
 
• Clause 5 outlines the problem from a primarily technical perspective.
 
• Clause 6 reviews some aspects of the integration of pervasive encryption to protocols in networks.
 
• Annex A provides a summary of the impact of pervasive encryption on various formal compliance obligations.
 
• Annex B gives an overview of the various common approaches to provide encryption in networks.
 
• Annex C offers a number of examples on the impact of pervasive encryption.
 
Thus the document is a report into the scope and scale of pervasive encryption in electronic/digital communications networks and the intended readership is all stakeholders. The document structure is intended to guide different readers to appropriate content.
 
This WiKi copies and expands a little on the content of Annex C.
 
FFS/TBD

Latest revision as of 11:03, 30 March 2022

ETI Problem Statement

The problem statement (linked to above) is where ETI starts from. The purpose of the document is to consider the impact of pervasive encryption on stakeholders, and to assist future standards development activity in mitigating the negative impact on stakeholders whilst not adversely impacting the positive impacts of such a paradigm on stakeholders, including the regulatory and lawful dimensions. The document is structured as follows (starting from the main body which always starts at clause 4 in ETSI publications):

• Clause 4 outlines the role of encryption as it is being applied to networks from a mainly business perspective.

• Clause 5 outlines the problem from a primarily technical perspective.

• Clause 6 reviews some aspects of the integration of pervasive encryption to protocols in networks.

• Annex A provides a summary of the impact of pervasive encryption on various formal compliance obligations.

• Annex B gives an overview of the various common approaches to provide encryption in networks.

• Annex C offers a number of examples on the impact of pervasive encryption.

Thus the document is a report into the scope and scale of pervasive encryption in electronic/digital communications networks and the intended readership is all stakeholders. The document structure is intended to guide different readers to appropriate content.

This WiKi copies and expands a little on the content of Annex C.

FFS/TBD