{"draft":"draft-ietf-geopriv-threat-analysis-01","doc_id":"RFC3694","title":"Threat Analysis of the Geopriv Protocol ","authors":["M. Danley","D. Mulligan","J. Morris","J. Peterson"],"format":["ASCII","HTML"],"page_count":"18","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Geographic Location\/Privacy","abstract":"This document provides some analysis of threats against the Geopriv protocol architecture. It focuses on protocol threats, threats that result from the storage of data by entities in the architecture, and threats posed by the abuse of information yielded by Geopriv. Some security properties that meet these threats are enumerated as a reference for Geopriv requirements. This memo provides information for the Internet community. ","pub_date":"January 2004","keywords":["privacy security","data information"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":["RFC6280"],"see_also":[],"doi":"10.17487\/RFC3694","errata_url":null}