Closed zsoltpardi closed 9 years ago
Would you please let me know if we are on the right tack with the security, some feedback would be very much appreciated about whether the content of this pull request if what we need, and whether I should continue with the security design based on this very high level description what we have so far in the security document. In case if I am on the right track with what we have so far then I would like to start filling out the high level design details such as authentication, key management, data protection, etc by mainly adding UML diagrams.
Updated content with the brief explanation of security threats and listing the open standards which will be used in WoT security.