Re: [dow1-2tf] RE: today's call
Hi Steve: I think Jeff is planning on getting documents related to the step by step procedure to the list this week, so you're right that we probably can't cover that this call. In terms of tiered access, I'd like to briefly review the two areas where I believe we agreed some outside expertise might be useful to the TF. Specifically: 1) What mechanisms third party authentication providers might use to verify that contact information provided by the requesting party is accurate, and 2) What technical credentials could be used by the Whois or related protocols to convey identity. For #1, we had discussed bringing in industry experts from, for example, current digital certificate providers who verify corporate and individual identities. For #2, it seems like another briefing from the CRISP group and perhaps others in the technical community might be appropriate. We can pick this conversation back up on the call, or people can feel free to nominate potential experts on the list as well. The other topic for discussion on this call would be planning for Cape Town, which didn't make it on to Glen's agenda. Jordyn On Nov 16, 2004, at 8:55 AM, Steven J. Metalitz IIPA wrote: Has anything been circulated to the list regarding items 1 (tiered access) or 2 (step by step procedure) of the agenda Glen circulated? If not can we assume these items are off the agenda today?
|